May 16 00:50:44.745397 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 16 00:50:44.745417 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 23:21:39 -00 2025 May 16 00:50:44.745425 kernel: efi: EFI v2.70 by EDK II May 16 00:50:44.745431 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 16 00:50:44.745436 kernel: random: crng init done May 16 00:50:44.745441 kernel: ACPI: Early table checksum verification disabled May 16 00:50:44.745448 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 16 00:50:44.745455 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 16 00:50:44.745460 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745466 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745471 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745476 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745482 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745488 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745496 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745502 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745508 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:50:44.745513 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 16 00:50:44.745519 kernel: NUMA: Failed to initialise from firmware May 16 00:50:44.745525 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:50:44.745531 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 16 00:50:44.745536 kernel: Zone ranges: May 16 00:50:44.745542 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:50:44.745549 kernel: DMA32 empty May 16 00:50:44.745555 kernel: Normal empty May 16 00:50:44.745560 kernel: Movable zone start for each node May 16 00:50:44.745566 kernel: Early memory node ranges May 16 00:50:44.745572 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 16 00:50:44.745578 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 16 00:50:44.745584 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 16 00:50:44.745589 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 16 00:50:44.745595 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 16 00:50:44.745601 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 16 00:50:44.745606 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 16 00:50:44.745612 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:50:44.745619 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 16 00:50:44.745625 kernel: psci: probing for conduit method from ACPI. May 16 00:50:44.745630 kernel: psci: PSCIv1.1 detected in firmware. May 16 00:50:44.745636 kernel: psci: Using standard PSCI v0.2 function IDs May 16 00:50:44.745642 kernel: psci: Trusted OS migration not required May 16 00:50:44.745650 kernel: psci: SMC Calling Convention v1.1 May 16 00:50:44.745657 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 16 00:50:44.745664 kernel: ACPI: SRAT not present May 16 00:50:44.745671 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 16 00:50:44.745677 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 16 00:50:44.745683 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 16 00:50:44.745689 kernel: Detected PIPT I-cache on CPU0 May 16 00:50:44.745695 kernel: CPU features: detected: GIC system register CPU interface May 16 00:50:44.745701 kernel: CPU features: detected: Hardware dirty bit management May 16 00:50:44.745707 kernel: CPU features: detected: Spectre-v4 May 16 00:50:44.745713 kernel: CPU features: detected: Spectre-BHB May 16 00:50:44.745720 kernel: CPU features: kernel page table isolation forced ON by KASLR May 16 00:50:44.745727 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 16 00:50:44.745733 kernel: CPU features: detected: ARM erratum 1418040 May 16 00:50:44.745739 kernel: CPU features: detected: SSBS not fully self-synchronizing May 16 00:50:44.745745 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 16 00:50:44.745751 kernel: Policy zone: DMA May 16 00:50:44.745758 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=2d88e96fdc9dc9b028836e57c250f3fd2abd3e6490e27ecbf72d8b216e3efce8 May 16 00:50:44.745769 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 16 00:50:44.745778 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 16 00:50:44.745784 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 16 00:50:44.745790 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 16 00:50:44.745799 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114948K reserved, 0K cma-reserved) May 16 00:50:44.745805 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 16 00:50:44.745811 kernel: trace event string verifier disabled May 16 00:50:44.745817 kernel: rcu: Preemptible hierarchical RCU implementation. May 16 00:50:44.745824 kernel: rcu: RCU event tracing is enabled. May 16 00:50:44.745830 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 16 00:50:44.745836 kernel: Trampoline variant of Tasks RCU enabled. May 16 00:50:44.745842 kernel: Tracing variant of Tasks RCU enabled. May 16 00:50:44.745856 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 16 00:50:44.745863 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 16 00:50:44.745869 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 16 00:50:44.745877 kernel: GICv3: 256 SPIs implemented May 16 00:50:44.745883 kernel: GICv3: 0 Extended SPIs implemented May 16 00:50:44.745889 kernel: GICv3: Distributor has no Range Selector support May 16 00:50:44.745895 kernel: Root IRQ handler: gic_handle_irq May 16 00:50:44.745901 kernel: GICv3: 16 PPIs implemented May 16 00:50:44.745907 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 16 00:50:44.745913 kernel: ACPI: SRAT not present May 16 00:50:44.745918 kernel: ITS [mem 0x08080000-0x0809ffff] May 16 00:50:44.745925 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 16 00:50:44.745931 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 16 00:50:44.745937 kernel: GICv3: using LPI property table @0x00000000400d0000 May 16 00:50:44.745943 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 16 00:50:44.745950 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:50:44.745957 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 16 00:50:44.745963 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 16 00:50:44.745969 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 16 00:50:44.745976 kernel: arm-pv: using stolen time PV May 16 00:50:44.745982 kernel: Console: colour dummy device 80x25 May 16 00:50:44.745988 kernel: ACPI: Core revision 20210730 May 16 00:50:44.745995 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 16 00:50:44.746001 kernel: pid_max: default: 32768 minimum: 301 May 16 00:50:44.746008 kernel: LSM: Security Framework initializing May 16 00:50:44.746015 kernel: SELinux: Initializing. May 16 00:50:44.746021 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 16 00:50:44.746028 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 16 00:50:44.746035 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 16 00:50:44.746041 kernel: rcu: Hierarchical SRCU implementation. May 16 00:50:44.746047 kernel: Platform MSI: ITS@0x8080000 domain created May 16 00:50:44.746054 kernel: PCI/MSI: ITS@0x8080000 domain created May 16 00:50:44.746060 kernel: Remapping and enabling EFI services. May 16 00:50:44.746066 kernel: smp: Bringing up secondary CPUs ... May 16 00:50:44.746074 kernel: Detected PIPT I-cache on CPU1 May 16 00:50:44.746080 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 16 00:50:44.746087 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 16 00:50:44.746093 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:50:44.746099 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 16 00:50:44.746106 kernel: Detected PIPT I-cache on CPU2 May 16 00:50:44.746112 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 16 00:50:44.746118 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 16 00:50:44.746125 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:50:44.746131 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 16 00:50:44.746138 kernel: Detected PIPT I-cache on CPU3 May 16 00:50:44.746145 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 16 00:50:44.746151 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 16 00:50:44.746158 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:50:44.746169 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 16 00:50:44.746176 kernel: smp: Brought up 1 node, 4 CPUs May 16 00:50:44.746183 kernel: SMP: Total of 4 processors activated. May 16 00:50:44.746189 kernel: CPU features: detected: 32-bit EL0 Support May 16 00:50:44.746196 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 16 00:50:44.746203 kernel: CPU features: detected: Common not Private translations May 16 00:50:44.746209 kernel: CPU features: detected: CRC32 instructions May 16 00:50:44.746216 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 16 00:50:44.746224 kernel: CPU features: detected: LSE atomic instructions May 16 00:50:44.746231 kernel: CPU features: detected: Privileged Access Never May 16 00:50:44.746238 kernel: CPU features: detected: RAS Extension Support May 16 00:50:44.746244 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 16 00:50:44.746251 kernel: CPU: All CPU(s) started at EL1 May 16 00:50:44.746259 kernel: alternatives: patching kernel code May 16 00:50:44.746265 kernel: devtmpfs: initialized May 16 00:50:44.746272 kernel: KASLR enabled May 16 00:50:44.746278 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 16 00:50:44.746285 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 16 00:50:44.746292 kernel: pinctrl core: initialized pinctrl subsystem May 16 00:50:44.746298 kernel: SMBIOS 3.0.0 present. May 16 00:50:44.746305 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 16 00:50:44.746311 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 16 00:50:44.746319 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 16 00:50:44.746326 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 16 00:50:44.746333 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 16 00:50:44.746339 kernel: audit: initializing netlink subsys (disabled) May 16 00:50:44.746346 kernel: audit: type=2000 audit(0.040:1): state=initialized audit_enabled=0 res=1 May 16 00:50:44.746353 kernel: thermal_sys: Registered thermal governor 'step_wise' May 16 00:50:44.746359 kernel: cpuidle: using governor menu May 16 00:50:44.746366 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 16 00:50:44.746372 kernel: ASID allocator initialised with 32768 entries May 16 00:50:44.746380 kernel: ACPI: bus type PCI registered May 16 00:50:44.746387 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 16 00:50:44.746394 kernel: Serial: AMBA PL011 UART driver May 16 00:50:44.746400 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 16 00:50:44.746407 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 16 00:50:44.746414 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 16 00:50:44.746420 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 16 00:50:44.746427 kernel: cryptd: max_cpu_qlen set to 1000 May 16 00:50:44.746434 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 16 00:50:44.746442 kernel: ACPI: Added _OSI(Module Device) May 16 00:50:44.746448 kernel: ACPI: Added _OSI(Processor Device) May 16 00:50:44.746455 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 16 00:50:44.746461 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 16 00:50:44.746468 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 16 00:50:44.746474 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 16 00:50:44.746481 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 16 00:50:44.746488 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 16 00:50:44.746494 kernel: ACPI: Interpreter enabled May 16 00:50:44.746502 kernel: ACPI: Using GIC for interrupt routing May 16 00:50:44.746508 kernel: ACPI: MCFG table detected, 1 entries May 16 00:50:44.746515 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 16 00:50:44.746522 kernel: printk: console [ttyAMA0] enabled May 16 00:50:44.746528 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 16 00:50:44.746656 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 16 00:50:44.746736 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 16 00:50:44.746803 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 16 00:50:44.746875 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 16 00:50:44.746935 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 16 00:50:44.746944 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 16 00:50:44.746951 kernel: PCI host bridge to bus 0000:00 May 16 00:50:44.747027 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 16 00:50:44.747084 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 16 00:50:44.747141 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 16 00:50:44.747195 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 16 00:50:44.747268 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 16 00:50:44.747338 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 16 00:50:44.747399 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 16 00:50:44.747459 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 16 00:50:44.747520 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 16 00:50:44.747579 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 16 00:50:44.747640 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 16 00:50:44.747702 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 16 00:50:44.747756 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 16 00:50:44.747816 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 16 00:50:44.747881 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 16 00:50:44.747891 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 16 00:50:44.747898 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 16 00:50:44.747907 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 16 00:50:44.747914 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 16 00:50:44.747920 kernel: iommu: Default domain type: Translated May 16 00:50:44.747927 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 16 00:50:44.747934 kernel: vgaarb: loaded May 16 00:50:44.747941 kernel: pps_core: LinuxPPS API ver. 1 registered May 16 00:50:44.747948 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 16 00:50:44.747954 kernel: PTP clock support registered May 16 00:50:44.747961 kernel: Registered efivars operations May 16 00:50:44.747969 kernel: clocksource: Switched to clocksource arch_sys_counter May 16 00:50:44.747976 kernel: VFS: Disk quotas dquot_6.6.0 May 16 00:50:44.747983 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 16 00:50:44.747989 kernel: pnp: PnP ACPI init May 16 00:50:44.748055 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 16 00:50:44.748065 kernel: pnp: PnP ACPI: found 1 devices May 16 00:50:44.748071 kernel: NET: Registered PF_INET protocol family May 16 00:50:44.748078 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 16 00:50:44.748087 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 16 00:50:44.748094 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 16 00:50:44.748100 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 16 00:50:44.748107 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 16 00:50:44.748114 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 16 00:50:44.748121 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 16 00:50:44.748127 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 16 00:50:44.748134 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 16 00:50:44.748141 kernel: PCI: CLS 0 bytes, default 64 May 16 00:50:44.748149 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 16 00:50:44.748156 kernel: kvm [1]: HYP mode not available May 16 00:50:44.748162 kernel: Initialise system trusted keyrings May 16 00:50:44.748169 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 16 00:50:44.748176 kernel: Key type asymmetric registered May 16 00:50:44.748182 kernel: Asymmetric key parser 'x509' registered May 16 00:50:44.748189 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 16 00:50:44.748196 kernel: io scheduler mq-deadline registered May 16 00:50:44.748203 kernel: io scheduler kyber registered May 16 00:50:44.748211 kernel: io scheduler bfq registered May 16 00:50:44.748218 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 16 00:50:44.748224 kernel: ACPI: button: Power Button [PWRB] May 16 00:50:44.748232 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 16 00:50:44.748292 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 16 00:50:44.748301 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 16 00:50:44.748309 kernel: thunder_xcv, ver 1.0 May 16 00:50:44.748315 kernel: thunder_bgx, ver 1.0 May 16 00:50:44.748322 kernel: nicpf, ver 1.0 May 16 00:50:44.748330 kernel: nicvf, ver 1.0 May 16 00:50:44.748407 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 16 00:50:44.748464 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-16T00:50:44 UTC (1747356644) May 16 00:50:44.748473 kernel: hid: raw HID events driver (C) Jiri Kosina May 16 00:50:44.748480 kernel: NET: Registered PF_INET6 protocol family May 16 00:50:44.748487 kernel: Segment Routing with IPv6 May 16 00:50:44.748493 kernel: In-situ OAM (IOAM) with IPv6 May 16 00:50:44.748500 kernel: NET: Registered PF_PACKET protocol family May 16 00:50:44.748508 kernel: Key type dns_resolver registered May 16 00:50:44.748515 kernel: registered taskstats version 1 May 16 00:50:44.748521 kernel: Loading compiled-in X.509 certificates May 16 00:50:44.748528 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 2793d535c1de6f1789b22ef06bd5666144f4eeb2' May 16 00:50:44.748534 kernel: Key type .fscrypt registered May 16 00:50:44.748541 kernel: Key type fscrypt-provisioning registered May 16 00:50:44.748548 kernel: ima: No TPM chip found, activating TPM-bypass! May 16 00:50:44.748555 kernel: ima: Allocated hash algorithm: sha1 May 16 00:50:44.748561 kernel: ima: No architecture policies found May 16 00:50:44.748569 kernel: clk: Disabling unused clocks May 16 00:50:44.748576 kernel: Freeing unused kernel memory: 36480K May 16 00:50:44.748583 kernel: Run /init as init process May 16 00:50:44.748589 kernel: with arguments: May 16 00:50:44.748596 kernel: /init May 16 00:50:44.748602 kernel: with environment: May 16 00:50:44.748608 kernel: HOME=/ May 16 00:50:44.748615 kernel: TERM=linux May 16 00:50:44.748622 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 16 00:50:44.748632 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 16 00:50:44.748641 systemd[1]: Detected virtualization kvm. May 16 00:50:44.748648 systemd[1]: Detected architecture arm64. May 16 00:50:44.748655 systemd[1]: Running in initrd. May 16 00:50:44.748662 systemd[1]: No hostname configured, using default hostname. May 16 00:50:44.748669 systemd[1]: Hostname set to . May 16 00:50:44.748677 systemd[1]: Initializing machine ID from VM UUID. May 16 00:50:44.748686 systemd[1]: Queued start job for default target initrd.target. May 16 00:50:44.748693 systemd[1]: Started systemd-ask-password-console.path. May 16 00:50:44.748700 systemd[1]: Reached target cryptsetup.target. May 16 00:50:44.748707 systemd[1]: Reached target paths.target. May 16 00:50:44.748714 systemd[1]: Reached target slices.target. May 16 00:50:44.748721 systemd[1]: Reached target swap.target. May 16 00:50:44.748728 systemd[1]: Reached target timers.target. May 16 00:50:44.748736 systemd[1]: Listening on iscsid.socket. May 16 00:50:44.748745 systemd[1]: Listening on iscsiuio.socket. May 16 00:50:44.748752 systemd[1]: Listening on systemd-journald-audit.socket. May 16 00:50:44.748759 systemd[1]: Listening on systemd-journald-dev-log.socket. May 16 00:50:44.748772 systemd[1]: Listening on systemd-journald.socket. May 16 00:50:44.748781 systemd[1]: Listening on systemd-networkd.socket. May 16 00:50:44.748789 systemd[1]: Listening on systemd-udevd-control.socket. May 16 00:50:44.748796 systemd[1]: Listening on systemd-udevd-kernel.socket. May 16 00:50:44.748803 systemd[1]: Reached target sockets.target. May 16 00:50:44.748812 systemd[1]: Starting kmod-static-nodes.service... May 16 00:50:44.748819 systemd[1]: Finished network-cleanup.service. May 16 00:50:44.748826 systemd[1]: Starting systemd-fsck-usr.service... May 16 00:50:44.748833 systemd[1]: Starting systemd-journald.service... May 16 00:50:44.748841 systemd[1]: Starting systemd-modules-load.service... May 16 00:50:44.748848 systemd[1]: Starting systemd-resolved.service... May 16 00:50:44.748865 systemd[1]: Starting systemd-vconsole-setup.service... May 16 00:50:44.748872 systemd[1]: Finished kmod-static-nodes.service. May 16 00:50:44.748879 systemd[1]: Finished systemd-fsck-usr.service. May 16 00:50:44.748888 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 16 00:50:44.748901 systemd-journald[291]: Journal started May 16 00:50:44.748943 systemd-journald[291]: Runtime Journal (/run/log/journal/72a9c90a1408408ab4040e72f6807bac) is 6.0M, max 48.7M, 42.6M free. May 16 00:50:44.740652 systemd-modules-load[292]: Inserted module 'overlay' May 16 00:50:44.751401 systemd[1]: Started systemd-journald.service. May 16 00:50:44.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.751923 systemd[1]: Finished systemd-vconsole-setup.service. May 16 00:50:44.754956 kernel: audit: type=1130 audit(1747356644.750:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.754439 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 16 00:50:44.760235 kernel: audit: type=1130 audit(1747356644.753:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.760254 kernel: audit: type=1130 audit(1747356644.754:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.756533 systemd[1]: Starting dracut-cmdline-ask.service... May 16 00:50:44.767878 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 16 00:50:44.769434 systemd-resolved[293]: Positive Trust Anchors: May 16 00:50:44.769451 systemd-resolved[293]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 16 00:50:44.769478 systemd-resolved[293]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 16 00:50:44.777617 kernel: Bridge firewalling registered May 16 00:50:44.772978 systemd-modules-load[292]: Inserted module 'br_netfilter' May 16 00:50:44.783526 kernel: audit: type=1130 audit(1747356644.777:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.773761 systemd-resolved[293]: Defaulting to hostname 'linux'. May 16 00:50:44.774560 systemd[1]: Started systemd-resolved.service. May 16 00:50:44.778346 systemd[1]: Reached target nss-lookup.target. May 16 00:50:44.787644 systemd[1]: Finished dracut-cmdline-ask.service. May 16 00:50:44.790699 kernel: SCSI subsystem initialized May 16 00:50:44.790720 kernel: audit: type=1130 audit(1747356644.787:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.789167 systemd[1]: Starting dracut-cmdline.service... May 16 00:50:44.795042 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 16 00:50:44.795078 kernel: device-mapper: uevent: version 1.0.3 May 16 00:50:44.795088 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 16 00:50:44.798133 systemd-modules-load[292]: Inserted module 'dm_multipath' May 16 00:50:44.798939 dracut-cmdline[308]: dracut-dracut-053 May 16 00:50:44.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.802084 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=2d88e96fdc9dc9b028836e57c250f3fd2abd3e6490e27ecbf72d8b216e3efce8 May 16 00:50:44.806163 kernel: audit: type=1130 audit(1747356644.798:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.799075 systemd[1]: Finished systemd-modules-load.service. May 16 00:50:44.800518 systemd[1]: Starting systemd-sysctl.service... May 16 00:50:44.809263 systemd[1]: Finished systemd-sysctl.service. May 16 00:50:44.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.812874 kernel: audit: type=1130 audit(1747356644.809:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.863873 kernel: Loading iSCSI transport class v2.0-870. May 16 00:50:44.875880 kernel: iscsi: registered transport (tcp) May 16 00:50:44.890886 kernel: iscsi: registered transport (qla4xxx) May 16 00:50:44.890944 kernel: QLogic iSCSI HBA Driver May 16 00:50:44.925646 systemd[1]: Finished dracut-cmdline.service. May 16 00:50:44.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.927257 systemd[1]: Starting dracut-pre-udev.service... May 16 00:50:44.929617 kernel: audit: type=1130 audit(1747356644.926:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:44.975890 kernel: raid6: neonx8 gen() 13751 MB/s May 16 00:50:44.992863 kernel: raid6: neonx8 xor() 10797 MB/s May 16 00:50:45.009865 kernel: raid6: neonx4 gen() 13514 MB/s May 16 00:50:45.026876 kernel: raid6: neonx4 xor() 11190 MB/s May 16 00:50:45.043875 kernel: raid6: neonx2 gen() 13009 MB/s May 16 00:50:45.060874 kernel: raid6: neonx2 xor() 10387 MB/s May 16 00:50:45.077866 kernel: raid6: neonx1 gen() 10614 MB/s May 16 00:50:45.094875 kernel: raid6: neonx1 xor() 8810 MB/s May 16 00:50:45.111865 kernel: raid6: int64x8 gen() 6272 MB/s May 16 00:50:45.128865 kernel: raid6: int64x8 xor() 3544 MB/s May 16 00:50:45.145874 kernel: raid6: int64x4 gen() 7217 MB/s May 16 00:50:45.162866 kernel: raid6: int64x4 xor() 3851 MB/s May 16 00:50:45.179867 kernel: raid6: int64x2 gen() 6152 MB/s May 16 00:50:45.196870 kernel: raid6: int64x2 xor() 3321 MB/s May 16 00:50:45.213867 kernel: raid6: int64x1 gen() 5043 MB/s May 16 00:50:45.231078 kernel: raid6: int64x1 xor() 2646 MB/s May 16 00:50:45.231090 kernel: raid6: using algorithm neonx8 gen() 13751 MB/s May 16 00:50:45.231098 kernel: raid6: .... xor() 10797 MB/s, rmw enabled May 16 00:50:45.231107 kernel: raid6: using neon recovery algorithm May 16 00:50:45.241921 kernel: xor: measuring software checksum speed May 16 00:50:45.241943 kernel: 8regs : 17213 MB/sec May 16 00:50:45.242994 kernel: 32regs : 20660 MB/sec May 16 00:50:45.243017 kernel: arm64_neon : 27626 MB/sec May 16 00:50:45.243034 kernel: xor: using function: arm64_neon (27626 MB/sec) May 16 00:50:45.296867 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 16 00:50:45.308138 systemd[1]: Finished dracut-pre-udev.service. May 16 00:50:45.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:45.311000 audit: BPF prog-id=7 op=LOAD May 16 00:50:45.311000 audit: BPF prog-id=8 op=LOAD May 16 00:50:45.311724 systemd[1]: Starting systemd-udevd.service... May 16 00:50:45.312944 kernel: audit: type=1130 audit(1747356645.307:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:45.324682 systemd-udevd[492]: Using default interface naming scheme 'v252'. May 16 00:50:45.328047 systemd[1]: Started systemd-udevd.service. May 16 00:50:45.327000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:45.329525 systemd[1]: Starting dracut-pre-trigger.service... May 16 00:50:45.341721 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation May 16 00:50:45.371634 systemd[1]: Finished dracut-pre-trigger.service. May 16 00:50:45.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:45.373155 systemd[1]: Starting systemd-udev-trigger.service... May 16 00:50:45.406881 systemd[1]: Finished systemd-udev-trigger.service. May 16 00:50:45.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:45.440863 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 16 00:50:45.444812 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 16 00:50:45.444837 kernel: GPT:9289727 != 19775487 May 16 00:50:45.444846 kernel: GPT:Alternate GPT header not at the end of the disk. May 16 00:50:45.444883 kernel: GPT:9289727 != 19775487 May 16 00:50:45.444892 kernel: GPT: Use GNU Parted to correct GPT errors. May 16 00:50:45.444901 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:50:45.460252 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 16 00:50:45.464458 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 16 00:50:45.465265 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 16 00:50:45.469619 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 16 00:50:45.471184 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (542) May 16 00:50:45.478909 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 16 00:50:45.480529 systemd[1]: Starting disk-uuid.service... May 16 00:50:45.486980 disk-uuid[561]: Primary Header is updated. May 16 00:50:45.486980 disk-uuid[561]: Secondary Entries is updated. May 16 00:50:45.486980 disk-uuid[561]: Secondary Header is updated. May 16 00:50:45.489890 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:50:46.510407 disk-uuid[562]: The operation has completed successfully. May 16 00:50:46.511295 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:50:46.537958 systemd[1]: disk-uuid.service: Deactivated successfully. May 16 00:50:46.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.538052 systemd[1]: Finished disk-uuid.service. May 16 00:50:46.539620 systemd[1]: Starting verity-setup.service... May 16 00:50:46.555879 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 16 00:50:46.576561 systemd[1]: Found device dev-mapper-usr.device. May 16 00:50:46.580452 systemd[1]: Mounting sysusr-usr.mount... May 16 00:50:46.581234 systemd[1]: Finished verity-setup.service. May 16 00:50:46.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.627571 systemd[1]: Mounted sysusr-usr.mount. May 16 00:50:46.628671 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 16 00:50:46.628326 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 16 00:50:46.628975 systemd[1]: Starting ignition-setup.service... May 16 00:50:46.630826 systemd[1]: Starting parse-ip-for-networkd.service... May 16 00:50:46.638392 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 16 00:50:46.638425 kernel: BTRFS info (device vda6): using free space tree May 16 00:50:46.638435 kernel: BTRFS info (device vda6): has skinny extents May 16 00:50:46.646645 systemd[1]: mnt-oem.mount: Deactivated successfully. May 16 00:50:46.652038 systemd[1]: Finished ignition-setup.service. May 16 00:50:46.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.653659 systemd[1]: Starting ignition-fetch-offline.service... May 16 00:50:46.716572 systemd[1]: Finished parse-ip-for-networkd.service. May 16 00:50:46.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.717000 audit: BPF prog-id=9 op=LOAD May 16 00:50:46.718661 systemd[1]: Starting systemd-networkd.service... May 16 00:50:46.737985 ignition[647]: Ignition 2.14.0 May 16 00:50:46.737995 ignition[647]: Stage: fetch-offline May 16 00:50:46.738033 ignition[647]: no configs at "/usr/lib/ignition/base.d" May 16 00:50:46.738041 ignition[647]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:50:46.738175 ignition[647]: parsed url from cmdline: "" May 16 00:50:46.738178 ignition[647]: no config URL provided May 16 00:50:46.738182 ignition[647]: reading system config file "/usr/lib/ignition/user.ign" May 16 00:50:46.738189 ignition[647]: no config at "/usr/lib/ignition/user.ign" May 16 00:50:46.738208 ignition[647]: op(1): [started] loading QEMU firmware config module May 16 00:50:46.738213 ignition[647]: op(1): executing: "modprobe" "qemu_fw_cfg" May 16 00:50:46.741568 ignition[647]: op(1): [finished] loading QEMU firmware config module May 16 00:50:46.746237 systemd-networkd[738]: lo: Link UP May 16 00:50:46.746251 systemd-networkd[738]: lo: Gained carrier May 16 00:50:46.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.746600 systemd-networkd[738]: Enumeration completed May 16 00:50:46.746695 systemd[1]: Started systemd-networkd.service. May 16 00:50:46.746780 systemd-networkd[738]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 16 00:50:46.747845 systemd-networkd[738]: eth0: Link UP May 16 00:50:46.747848 systemd-networkd[738]: eth0: Gained carrier May 16 00:50:46.748013 systemd[1]: Reached target network.target. May 16 00:50:46.749986 systemd[1]: Starting iscsiuio.service... May 16 00:50:46.759165 systemd[1]: Started iscsiuio.service. May 16 00:50:46.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.760634 systemd[1]: Starting iscsid.service... May 16 00:50:46.764180 iscsid[745]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 16 00:50:46.764180 iscsid[745]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 16 00:50:46.764180 iscsid[745]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 16 00:50:46.764180 iscsid[745]: If using hardware iscsi like qla4xxx this message can be ignored. May 16 00:50:46.764180 iscsid[745]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 16 00:50:46.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.775080 iscsid[745]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 16 00:50:46.768394 systemd[1]: Started iscsid.service. May 16 00:50:46.770925 systemd-networkd[738]: eth0: DHCPv4 address 10.0.0.127/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 16 00:50:46.772049 systemd[1]: Starting dracut-initqueue.service... May 16 00:50:46.782560 systemd[1]: Finished dracut-initqueue.service. May 16 00:50:46.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.783437 systemd[1]: Reached target remote-fs-pre.target. May 16 00:50:46.784733 systemd[1]: Reached target remote-cryptsetup.target. May 16 00:50:46.786162 systemd[1]: Reached target remote-fs.target. May 16 00:50:46.788182 systemd[1]: Starting dracut-pre-mount.service... May 16 00:50:46.795996 systemd[1]: Finished dracut-pre-mount.service. May 16 00:50:46.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.808179 ignition[647]: parsing config with SHA512: a9173fa126a7487440e757fb9b65e150ffca9272ddb12cdb6df46315d73b5a0f41141bb3493e1c68397abf810a40299c4ef354f2fd0d2b7bec1dc90c15a686c6 May 16 00:50:46.822936 unknown[647]: fetched base config from "system" May 16 00:50:46.822948 unknown[647]: fetched user config from "qemu" May 16 00:50:46.823567 ignition[647]: fetch-offline: fetch-offline passed May 16 00:50:46.824482 systemd[1]: Finished ignition-fetch-offline.service. May 16 00:50:46.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.823631 ignition[647]: Ignition finished successfully May 16 00:50:46.825612 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 16 00:50:46.826369 systemd[1]: Starting ignition-kargs.service... May 16 00:50:46.835458 ignition[759]: Ignition 2.14.0 May 16 00:50:46.835467 ignition[759]: Stage: kargs May 16 00:50:46.835555 ignition[759]: no configs at "/usr/lib/ignition/base.d" May 16 00:50:46.835564 ignition[759]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:50:46.836441 ignition[759]: kargs: kargs passed May 16 00:50:46.838111 systemd[1]: Finished ignition-kargs.service. May 16 00:50:46.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.836480 ignition[759]: Ignition finished successfully May 16 00:50:46.839728 systemd[1]: Starting ignition-disks.service... May 16 00:50:46.846367 ignition[765]: Ignition 2.14.0 May 16 00:50:46.846377 ignition[765]: Stage: disks May 16 00:50:46.846461 ignition[765]: no configs at "/usr/lib/ignition/base.d" May 16 00:50:46.848262 systemd[1]: Finished ignition-disks.service. May 16 00:50:46.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.846470 ignition[765]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:50:46.849534 systemd[1]: Reached target initrd-root-device.target. May 16 00:50:46.847246 ignition[765]: disks: disks passed May 16 00:50:46.850511 systemd[1]: Reached target local-fs-pre.target. May 16 00:50:46.847282 ignition[765]: Ignition finished successfully May 16 00:50:46.851900 systemd[1]: Reached target local-fs.target. May 16 00:50:46.853019 systemd[1]: Reached target sysinit.target. May 16 00:50:46.853942 systemd[1]: Reached target basic.target. May 16 00:50:46.855718 systemd[1]: Starting systemd-fsck-root.service... May 16 00:50:46.866176 systemd-fsck[773]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 16 00:50:46.870551 systemd[1]: Finished systemd-fsck-root.service. May 16 00:50:46.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.873596 systemd[1]: Mounting sysroot.mount... May 16 00:50:46.879891 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 16 00:50:46.880017 systemd[1]: Mounted sysroot.mount. May 16 00:50:46.881143 systemd[1]: Reached target initrd-root-fs.target. May 16 00:50:46.883283 systemd[1]: Mounting sysroot-usr.mount... May 16 00:50:46.884658 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 16 00:50:46.884708 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 16 00:50:46.884732 systemd[1]: Reached target ignition-diskful.target. May 16 00:50:46.887086 systemd[1]: Mounted sysroot-usr.mount. May 16 00:50:46.888632 systemd[1]: Starting initrd-setup-root.service... May 16 00:50:46.892747 initrd-setup-root[783]: cut: /sysroot/etc/passwd: No such file or directory May 16 00:50:46.897201 initrd-setup-root[791]: cut: /sysroot/etc/group: No such file or directory May 16 00:50:46.900892 initrd-setup-root[799]: cut: /sysroot/etc/shadow: No such file or directory May 16 00:50:46.903887 initrd-setup-root[807]: cut: /sysroot/etc/gshadow: No such file or directory May 16 00:50:46.929704 systemd[1]: Finished initrd-setup-root.service. May 16 00:50:46.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.931031 systemd[1]: Starting ignition-mount.service... May 16 00:50:46.932280 systemd[1]: Starting sysroot-boot.service... May 16 00:50:46.937314 bash[824]: umount: /sysroot/usr/share/oem: not mounted. May 16 00:50:46.945379 ignition[826]: INFO : Ignition 2.14.0 May 16 00:50:46.945379 ignition[826]: INFO : Stage: mount May 16 00:50:46.947346 ignition[826]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:50:46.947346 ignition[826]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:50:46.947346 ignition[826]: INFO : mount: mount passed May 16 00:50:46.947346 ignition[826]: INFO : Ignition finished successfully May 16 00:50:46.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:46.948060 systemd[1]: Finished ignition-mount.service. May 16 00:50:46.949108 systemd[1]: Finished sysroot-boot.service. May 16 00:50:47.588034 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 16 00:50:47.594553 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (834) May 16 00:50:47.594587 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 16 00:50:47.594597 kernel: BTRFS info (device vda6): using free space tree May 16 00:50:47.595039 kernel: BTRFS info (device vda6): has skinny extents May 16 00:50:47.598291 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 16 00:50:47.599607 systemd[1]: Starting ignition-files.service... May 16 00:50:47.613787 ignition[854]: INFO : Ignition 2.14.0 May 16 00:50:47.613787 ignition[854]: INFO : Stage: files May 16 00:50:47.614938 ignition[854]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:50:47.614938 ignition[854]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:50:47.616366 ignition[854]: DEBUG : files: compiled without relabeling support, skipping May 16 00:50:47.623379 ignition[854]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 16 00:50:47.623379 ignition[854]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 16 00:50:47.626648 ignition[854]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 16 00:50:47.627805 ignition[854]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 16 00:50:47.629223 unknown[854]: wrote ssh authorized keys file for user: core May 16 00:50:47.630131 ignition[854]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 16 00:50:47.630131 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 16 00:50:47.630131 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 May 16 00:50:47.634148 systemd-resolved[293]: Detected conflict on linux IN A 10.0.0.127 May 16 00:50:47.634162 systemd-resolved[293]: Hostname conflict, changing published hostname from 'linux' to 'linux9'. May 16 00:50:47.677301 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 16 00:50:47.867985 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" May 16 00:50:47.867985 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 16 00:50:47.871230 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 16 00:50:47.871230 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 16 00:50:47.871230 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 16 00:50:47.871230 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 16 00:50:47.871230 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 16 00:50:47.871230 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 16 00:50:47.871230 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 16 00:50:47.880141 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 16 00:50:47.880141 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 16 00:50:47.880141 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 16 00:50:47.880141 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 16 00:50:47.880141 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 16 00:50:47.880141 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-arm64.raw: attempt #1 May 16 00:50:48.051994 systemd-networkd[738]: eth0: Gained IPv6LL May 16 00:50:48.823779 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 16 00:50:49.379415 ignition[854]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-arm64.raw" May 16 00:50:49.379415 ignition[854]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 16 00:50:49.379415 ignition[854]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 16 00:50:49.386118 ignition[854]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 16 00:50:49.419823 ignition[854]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 16 00:50:49.419823 ignition[854]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 16 00:50:49.419823 ignition[854]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 16 00:50:49.419823 ignition[854]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 16 00:50:49.419823 ignition[854]: INFO : files: files passed May 16 00:50:49.419823 ignition[854]: INFO : Ignition finished successfully May 16 00:50:49.446888 kernel: kauditd_printk_skb: 23 callbacks suppressed May 16 00:50:49.446909 kernel: audit: type=1130 audit(1747356649.418:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.446920 kernel: audit: type=1130 audit(1747356649.437:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.446930 kernel: audit: type=1131 audit(1747356649.437:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.446939 kernel: audit: type=1130 audit(1747356649.440:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.419202 systemd[1]: Finished ignition-files.service. May 16 00:50:49.422630 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 16 00:50:49.425041 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 16 00:50:49.454179 initrd-setup-root-after-ignition[879]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 16 00:50:49.425664 systemd[1]: Starting ignition-quench.service... May 16 00:50:49.459920 initrd-setup-root-after-ignition[881]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 16 00:50:49.428377 systemd[1]: ignition-quench.service: Deactivated successfully. May 16 00:50:49.428460 systemd[1]: Finished ignition-quench.service. May 16 00:50:49.438112 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 16 00:50:49.443315 systemd[1]: Reached target ignition-complete.target. May 16 00:50:49.449904 systemd[1]: Starting initrd-parse-etc.service... May 16 00:50:49.469701 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 16 00:50:49.469809 systemd[1]: Finished initrd-parse-etc.service. May 16 00:50:49.477704 kernel: audit: type=1130 audit(1747356649.470:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.477744 kernel: audit: type=1131 audit(1747356649.470:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.471257 systemd[1]: Reached target initrd-fs.target. May 16 00:50:49.478328 systemd[1]: Reached target initrd.target. May 16 00:50:49.479488 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 16 00:50:49.480198 systemd[1]: Starting dracut-pre-pivot.service... May 16 00:50:49.490284 systemd[1]: Finished dracut-pre-pivot.service. May 16 00:50:49.491610 systemd[1]: Starting initrd-cleanup.service... May 16 00:50:49.494902 kernel: audit: type=1130 audit(1747356649.490:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.499422 systemd[1]: Stopped target nss-lookup.target. May 16 00:50:49.500157 systemd[1]: Stopped target remote-cryptsetup.target. May 16 00:50:49.501333 systemd[1]: Stopped target timers.target. May 16 00:50:49.502449 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 16 00:50:49.502558 systemd[1]: Stopped dracut-pre-pivot.service. May 16 00:50:49.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.504183 systemd[1]: Stopped target initrd.target. May 16 00:50:49.512615 kernel: audit: type=1131 audit(1747356649.502:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.504808 systemd[1]: Stopped target basic.target. May 16 00:50:49.512205 systemd[1]: Stopped target ignition-complete.target. May 16 00:50:49.513272 systemd[1]: Stopped target ignition-diskful.target. May 16 00:50:49.514330 systemd[1]: Stopped target initrd-root-device.target. May 16 00:50:49.515492 systemd[1]: Stopped target remote-fs.target. May 16 00:50:49.516547 systemd[1]: Stopped target remote-fs-pre.target. May 16 00:50:49.517679 systemd[1]: Stopped target sysinit.target. May 16 00:50:49.518679 systemd[1]: Stopped target local-fs.target. May 16 00:50:49.519783 systemd[1]: Stopped target local-fs-pre.target. May 16 00:50:49.520909 systemd[1]: Stopped target swap.target. May 16 00:50:49.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.521909 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 16 00:50:49.526664 kernel: audit: type=1131 audit(1747356649.522:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.522021 systemd[1]: Stopped dracut-pre-mount.service. May 16 00:50:49.526000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.523099 systemd[1]: Stopped target cryptsetup.target. May 16 00:50:49.530793 kernel: audit: type=1131 audit(1747356649.526:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.525997 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 16 00:50:49.526099 systemd[1]: Stopped dracut-initqueue.service. May 16 00:50:49.527387 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 16 00:50:49.527480 systemd[1]: Stopped ignition-fetch-offline.service. May 16 00:50:49.530432 systemd[1]: Stopped target paths.target. May 16 00:50:49.531346 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 16 00:50:49.534892 systemd[1]: Stopped systemd-ask-password-console.path. May 16 00:50:49.536123 systemd[1]: Stopped target slices.target. May 16 00:50:49.537198 systemd[1]: Stopped target sockets.target. May 16 00:50:49.538194 systemd[1]: iscsid.socket: Deactivated successfully. May 16 00:50:49.538268 systemd[1]: Closed iscsid.socket. May 16 00:50:49.539168 systemd[1]: iscsiuio.socket: Deactivated successfully. May 16 00:50:49.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.539234 systemd[1]: Closed iscsiuio.socket. May 16 00:50:49.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.540214 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 16 00:50:49.540311 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 16 00:50:49.541304 systemd[1]: ignition-files.service: Deactivated successfully. May 16 00:50:49.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.541393 systemd[1]: Stopped ignition-files.service. May 16 00:50:49.543262 systemd[1]: Stopping ignition-mount.service... May 16 00:50:49.544230 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 16 00:50:49.544356 systemd[1]: Stopped kmod-static-nodes.service. May 16 00:50:49.547000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.546280 systemd[1]: Stopping sysroot-boot.service... May 16 00:50:49.550969 ignition[894]: INFO : Ignition 2.14.0 May 16 00:50:49.550969 ignition[894]: INFO : Stage: umount May 16 00:50:49.550969 ignition[894]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:50:49.550969 ignition[894]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:50:49.550969 ignition[894]: INFO : umount: umount passed May 16 00:50:49.550969 ignition[894]: INFO : Ignition finished successfully May 16 00:50:49.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.556000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.558000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.547299 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 16 00:50:49.547427 systemd[1]: Stopped systemd-udev-trigger.service. May 16 00:50:49.548547 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 16 00:50:49.548650 systemd[1]: Stopped dracut-pre-trigger.service. May 16 00:50:49.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.551318 systemd[1]: ignition-mount.service: Deactivated successfully. May 16 00:50:49.551416 systemd[1]: Stopped ignition-mount.service. May 16 00:50:49.552727 systemd[1]: Stopped target network.target. May 16 00:50:49.554055 systemd[1]: ignition-disks.service: Deactivated successfully. May 16 00:50:49.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.554103 systemd[1]: Stopped ignition-disks.service. May 16 00:50:49.555350 systemd[1]: ignition-kargs.service: Deactivated successfully. May 16 00:50:49.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.555385 systemd[1]: Stopped ignition-kargs.service. May 16 00:50:49.573000 audit: BPF prog-id=6 op=UNLOAD May 16 00:50:49.556974 systemd[1]: ignition-setup.service: Deactivated successfully. May 16 00:50:49.557011 systemd[1]: Stopped ignition-setup.service. May 16 00:50:49.558427 systemd[1]: Stopping systemd-networkd.service... May 16 00:50:49.559994 systemd[1]: Stopping systemd-resolved.service... May 16 00:50:49.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.562931 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 16 00:50:49.563428 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 16 00:50:49.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.563508 systemd[1]: Finished initrd-cleanup.service. May 16 00:50:49.567050 systemd-networkd[738]: eth0: DHCPv6 lease lost May 16 00:50:49.587000 audit: BPF prog-id=9 op=UNLOAD May 16 00:50:49.567093 systemd[1]: systemd-resolved.service: Deactivated successfully. May 16 00:50:49.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.567188 systemd[1]: Stopped systemd-resolved.service. May 16 00:50:49.570225 systemd[1]: systemd-networkd.service: Deactivated successfully. May 16 00:50:49.570351 systemd[1]: Stopped systemd-networkd.service. May 16 00:50:49.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.572660 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 16 00:50:49.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.572692 systemd[1]: Closed systemd-networkd.socket. May 16 00:50:49.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.575188 systemd[1]: Stopping network-cleanup.service... May 16 00:50:49.576000 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 16 00:50:49.576061 systemd[1]: Stopped parse-ip-for-networkd.service. May 16 00:50:49.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.578024 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 16 00:50:49.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.578070 systemd[1]: Stopped systemd-sysctl.service. May 16 00:50:49.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.578825 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 16 00:50:49.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:49.578885 systemd[1]: Stopped systemd-modules-load.service. May 16 00:50:49.580405 systemd[1]: Stopping systemd-udevd.service... May 16 00:50:49.581977 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 16 00:50:49.585505 systemd[1]: network-cleanup.service: Deactivated successfully. May 16 00:50:49.585593 systemd[1]: Stopped network-cleanup.service. May 16 00:50:49.589259 systemd[1]: systemd-udevd.service: Deactivated successfully. May 16 00:50:49.589377 systemd[1]: Stopped systemd-udevd.service. May 16 00:50:49.590225 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 16 00:50:49.590263 systemd[1]: Closed systemd-udevd-control.socket. May 16 00:50:49.591072 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 16 00:50:49.591106 systemd[1]: Closed systemd-udevd-kernel.socket. May 16 00:50:49.592413 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 16 00:50:49.592456 systemd[1]: Stopped dracut-pre-udev.service. May 16 00:50:49.593769 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 16 00:50:49.593812 systemd[1]: Stopped dracut-cmdline.service. May 16 00:50:49.594976 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 16 00:50:49.595012 systemd[1]: Stopped dracut-cmdline-ask.service. May 16 00:50:49.597191 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 16 00:50:49.598436 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 16 00:50:49.598492 systemd[1]: Stopped systemd-vconsole-setup.service. May 16 00:50:49.600527 systemd[1]: sysroot-boot.service: Deactivated successfully. May 16 00:50:49.600647 systemd[1]: Stopped sysroot-boot.service. May 16 00:50:49.601660 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 16 00:50:49.601698 systemd[1]: Stopped initrd-setup-root.service. May 16 00:50:49.603037 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 16 00:50:49.603120 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 16 00:50:49.604171 systemd[1]: Reached target initrd-switch-root.target. May 16 00:50:49.606236 systemd[1]: Starting initrd-switch-root.service... May 16 00:50:49.612652 systemd[1]: Switching root. May 16 00:50:49.634217 iscsid[745]: iscsid shutting down. May 16 00:50:49.634783 systemd-journald[291]: Journal stopped May 16 00:50:51.607936 systemd-journald[291]: Received SIGTERM from PID 1 (systemd). May 16 00:50:51.608012 kernel: SELinux: Class mctp_socket not defined in policy. May 16 00:50:51.608028 kernel: SELinux: Class anon_inode not defined in policy. May 16 00:50:51.608038 kernel: SELinux: the above unknown classes and permissions will be allowed May 16 00:50:51.608048 kernel: SELinux: policy capability network_peer_controls=1 May 16 00:50:51.608058 kernel: SELinux: policy capability open_perms=1 May 16 00:50:51.608068 kernel: SELinux: policy capability extended_socket_class=1 May 16 00:50:51.608086 kernel: SELinux: policy capability always_check_network=0 May 16 00:50:51.608095 kernel: SELinux: policy capability cgroup_seclabel=1 May 16 00:50:51.608105 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 16 00:50:51.608115 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 16 00:50:51.608125 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 16 00:50:51.608138 systemd[1]: Successfully loaded SELinux policy in 33.289ms. May 16 00:50:51.608155 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.950ms. May 16 00:50:51.608167 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 16 00:50:51.608178 systemd[1]: Detected virtualization kvm. May 16 00:50:51.608188 systemd[1]: Detected architecture arm64. May 16 00:50:51.608199 systemd[1]: Detected first boot. May 16 00:50:51.608209 systemd[1]: Initializing machine ID from VM UUID. May 16 00:50:51.608220 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 16 00:50:51.608231 systemd[1]: Populated /etc with preset unit settings. May 16 00:50:51.608243 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:50:51.608255 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:50:51.608267 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:50:51.608279 systemd[1]: iscsiuio.service: Deactivated successfully. May 16 00:50:51.608289 systemd[1]: Stopped iscsiuio.service. May 16 00:50:51.608300 systemd[1]: iscsid.service: Deactivated successfully. May 16 00:50:51.608312 systemd[1]: Stopped iscsid.service. May 16 00:50:51.608323 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 16 00:50:51.608335 systemd[1]: Stopped initrd-switch-root.service. May 16 00:50:51.608346 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 16 00:50:51.608357 systemd[1]: Created slice system-addon\x2dconfig.slice. May 16 00:50:51.608369 systemd[1]: Created slice system-addon\x2drun.slice. May 16 00:50:51.608380 systemd[1]: Created slice system-getty.slice. May 16 00:50:51.608391 systemd[1]: Created slice system-modprobe.slice. May 16 00:50:51.608402 systemd[1]: Created slice system-serial\x2dgetty.slice. May 16 00:50:51.608413 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 16 00:50:51.608424 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 16 00:50:51.608434 systemd[1]: Created slice user.slice. May 16 00:50:51.608445 systemd[1]: Started systemd-ask-password-console.path. May 16 00:50:51.608456 systemd[1]: Started systemd-ask-password-wall.path. May 16 00:50:51.608468 systemd[1]: Set up automount boot.automount. May 16 00:50:51.608479 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 16 00:50:51.608490 systemd[1]: Stopped target initrd-switch-root.target. May 16 00:50:51.608501 systemd[1]: Stopped target initrd-fs.target. May 16 00:50:51.608512 systemd[1]: Stopped target initrd-root-fs.target. May 16 00:50:51.608523 systemd[1]: Reached target integritysetup.target. May 16 00:50:51.608534 systemd[1]: Reached target remote-cryptsetup.target. May 16 00:50:51.608546 systemd[1]: Reached target remote-fs.target. May 16 00:50:51.608558 systemd[1]: Reached target slices.target. May 16 00:50:51.608569 systemd[1]: Reached target swap.target. May 16 00:50:51.608580 systemd[1]: Reached target torcx.target. May 16 00:50:51.608590 systemd[1]: Reached target veritysetup.target. May 16 00:50:51.608601 systemd[1]: Listening on systemd-coredump.socket. May 16 00:50:51.608611 systemd[1]: Listening on systemd-initctl.socket. May 16 00:50:51.608622 systemd[1]: Listening on systemd-networkd.socket. May 16 00:50:51.608633 systemd[1]: Listening on systemd-udevd-control.socket. May 16 00:50:51.608644 systemd[1]: Listening on systemd-udevd-kernel.socket. May 16 00:50:51.608654 systemd[1]: Listening on systemd-userdbd.socket. May 16 00:50:51.608667 systemd[1]: Mounting dev-hugepages.mount... May 16 00:50:51.608678 systemd[1]: Mounting dev-mqueue.mount... May 16 00:50:51.608689 systemd[1]: Mounting media.mount... May 16 00:50:51.608700 systemd[1]: Mounting sys-kernel-debug.mount... May 16 00:50:51.608711 systemd[1]: Mounting sys-kernel-tracing.mount... May 16 00:50:51.608723 systemd[1]: Mounting tmp.mount... May 16 00:50:51.608734 systemd[1]: Starting flatcar-tmpfiles.service... May 16 00:50:51.608744 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:50:51.608756 systemd[1]: Starting kmod-static-nodes.service... May 16 00:50:51.608776 systemd[1]: Starting modprobe@configfs.service... May 16 00:50:51.608787 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:50:51.608798 systemd[1]: Starting modprobe@drm.service... May 16 00:50:51.608809 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:50:51.608819 systemd[1]: Starting modprobe@fuse.service... May 16 00:50:51.608830 systemd[1]: Starting modprobe@loop.service... May 16 00:50:51.608841 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 16 00:50:51.608892 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 16 00:50:51.608907 systemd[1]: Stopped systemd-fsck-root.service. May 16 00:50:51.608918 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 16 00:50:51.608929 systemd[1]: Stopped systemd-fsck-usr.service. May 16 00:50:51.608940 systemd[1]: Stopped systemd-journald.service. May 16 00:50:51.608951 systemd[1]: Starting systemd-journald.service... May 16 00:50:51.608961 kernel: fuse: init (API version 7.34) May 16 00:50:51.608971 systemd[1]: Starting systemd-modules-load.service... May 16 00:50:51.608986 systemd[1]: Starting systemd-network-generator.service... May 16 00:50:51.608996 systemd[1]: Starting systemd-remount-fs.service... May 16 00:50:51.609007 systemd[1]: Starting systemd-udev-trigger.service... May 16 00:50:51.609019 systemd[1]: verity-setup.service: Deactivated successfully. May 16 00:50:51.609030 systemd[1]: Stopped verity-setup.service. May 16 00:50:51.609040 systemd[1]: Mounted dev-hugepages.mount. May 16 00:50:51.609050 kernel: loop: module loaded May 16 00:50:51.609060 systemd[1]: Mounted dev-mqueue.mount. May 16 00:50:51.609071 systemd[1]: Mounted media.mount. May 16 00:50:51.609081 systemd[1]: Mounted sys-kernel-debug.mount. May 16 00:50:51.609091 systemd[1]: Mounted sys-kernel-tracing.mount. May 16 00:50:51.609102 systemd[1]: Mounted tmp.mount. May 16 00:50:51.609117 systemd-journald[989]: Journal started May 16 00:50:51.609162 systemd-journald[989]: Runtime Journal (/run/log/journal/72a9c90a1408408ab4040e72f6807bac) is 6.0M, max 48.7M, 42.6M free. May 16 00:50:49.702000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 16 00:50:49.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 16 00:50:49.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 16 00:50:49.781000 audit: BPF prog-id=10 op=LOAD May 16 00:50:49.781000 audit: BPF prog-id=10 op=UNLOAD May 16 00:50:49.781000 audit: BPF prog-id=11 op=LOAD May 16 00:50:49.781000 audit: BPF prog-id=11 op=UNLOAD May 16 00:50:49.823000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 16 00:50:49.823000 audit[927]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c589c a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:49.823000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 16 00:50:49.823000 audit[927]: AVC avc: denied { associate } for pid=927 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 16 00:50:49.823000 audit[927]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5975 a2=1ed a3=0 items=2 ppid=910 pid=927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:49.823000 audit: CWD cwd="/" May 16 00:50:49.823000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:50:49.823000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:50:49.823000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 16 00:50:51.484000 audit: BPF prog-id=12 op=LOAD May 16 00:50:51.484000 audit: BPF prog-id=3 op=UNLOAD May 16 00:50:51.484000 audit: BPF prog-id=13 op=LOAD May 16 00:50:51.484000 audit: BPF prog-id=14 op=LOAD May 16 00:50:51.484000 audit: BPF prog-id=4 op=UNLOAD May 16 00:50:51.484000 audit: BPF prog-id=5 op=UNLOAD May 16 00:50:51.485000 audit: BPF prog-id=15 op=LOAD May 16 00:50:51.485000 audit: BPF prog-id=12 op=UNLOAD May 16 00:50:51.485000 audit: BPF prog-id=16 op=LOAD May 16 00:50:51.485000 audit: BPF prog-id=17 op=LOAD May 16 00:50:51.485000 audit: BPF prog-id=13 op=UNLOAD May 16 00:50:51.485000 audit: BPF prog-id=14 op=UNLOAD May 16 00:50:51.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.495000 audit: BPF prog-id=15 op=UNLOAD May 16 00:50:51.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.577000 audit: BPF prog-id=18 op=LOAD May 16 00:50:51.577000 audit: BPF prog-id=19 op=LOAD May 16 00:50:51.577000 audit: BPF prog-id=20 op=LOAD May 16 00:50:51.577000 audit: BPF prog-id=16 op=UNLOAD May 16 00:50:51.577000 audit: BPF prog-id=17 op=UNLOAD May 16 00:50:51.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.604000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 16 00:50:51.604000 audit[989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=ffffc638cca0 a2=4000 a3=1 items=0 ppid=1 pid=989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:51.604000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 16 00:50:51.483139 systemd[1]: Queued start job for default target multi-user.target. May 16 00:50:51.610315 systemd[1]: Finished kmod-static-nodes.service. May 16 00:50:49.822520 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:50:51.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.483151 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 16 00:50:49.822753 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 16 00:50:51.486906 systemd[1]: systemd-journald.service: Deactivated successfully. May 16 00:50:49.822779 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 16 00:50:49.822807 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 16 00:50:49.822817 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="skipped missing lower profile" missing profile=oem May 16 00:50:49.822843 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 16 00:50:49.822870 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 16 00:50:49.823062 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 16 00:50:49.823096 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 16 00:50:49.823107 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 16 00:50:49.823503 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 16 00:50:49.823537 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 16 00:50:49.823553 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 16 00:50:49.823567 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 16 00:50:49.823583 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 16 00:50:49.823595 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 16 00:50:51.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.244901 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:51Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:50:51.245156 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:51Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:50:51.245256 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:51Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:50:51.245419 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:51Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:50:51.611877 systemd[1]: Started systemd-journald.service. May 16 00:50:51.245467 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:51Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 16 00:50:51.245523 /usr/lib/systemd/system-generators/torcx-generator[927]: time="2025-05-16T00:50:51Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 16 00:50:51.612197 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 16 00:50:51.612572 systemd[1]: Finished modprobe@configfs.service. May 16 00:50:51.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.613506 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:50:51.613663 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:50:51.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.614561 systemd[1]: modprobe@drm.service: Deactivated successfully. May 16 00:50:51.614711 systemd[1]: Finished modprobe@drm.service. May 16 00:50:51.615779 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:50:51.616020 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:50:51.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.616914 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 16 00:50:51.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.617701 systemd[1]: Finished modprobe@fuse.service. May 16 00:50:51.618671 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:50:51.618839 systemd[1]: Finished modprobe@loop.service. May 16 00:50:51.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.619723 systemd[1]: Finished systemd-modules-load.service. May 16 00:50:51.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.620682 systemd[1]: Finished systemd-network-generator.service. May 16 00:50:51.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.621680 systemd[1]: Finished systemd-remount-fs.service. May 16 00:50:51.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.622956 systemd[1]: Reached target network-pre.target. May 16 00:50:51.624973 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 16 00:50:51.626868 systemd[1]: Mounting sys-kernel-config.mount... May 16 00:50:51.627442 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 16 00:50:51.629152 systemd[1]: Starting systemd-hwdb-update.service... May 16 00:50:51.630935 systemd[1]: Starting systemd-journal-flush.service... May 16 00:50:51.631634 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:50:51.632627 systemd[1]: Starting systemd-random-seed.service... May 16 00:50:51.633337 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:50:51.634430 systemd[1]: Starting systemd-sysctl.service... May 16 00:50:51.637000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.636712 systemd[1]: Finished flatcar-tmpfiles.service. May 16 00:50:51.637603 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 16 00:50:51.638413 systemd[1]: Mounted sys-kernel-config.mount. May 16 00:50:51.641224 systemd[1]: Starting systemd-sysusers.service... May 16 00:50:51.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.643756 systemd[1]: Finished systemd-random-seed.service. May 16 00:50:51.644602 systemd[1]: Reached target first-boot-complete.target. May 16 00:50:51.651032 systemd-journald[989]: Time spent on flushing to /var/log/journal/72a9c90a1408408ab4040e72f6807bac is 12.179ms for 999 entries. May 16 00:50:51.651032 systemd-journald[989]: System Journal (/var/log/journal/72a9c90a1408408ab4040e72f6807bac) is 8.0M, max 195.6M, 187.6M free. May 16 00:50:51.674364 systemd-journald[989]: Received client request to flush runtime journal. May 16 00:50:51.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.669000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.652241 systemd[1]: Finished systemd-sysctl.service. May 16 00:50:51.653119 systemd[1]: Finished systemd-udev-trigger.service. May 16 00:50:51.674818 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 16 00:50:51.654803 systemd[1]: Starting systemd-udev-settle.service... May 16 00:50:51.668459 systemd[1]: Finished systemd-sysusers.service. May 16 00:50:51.675200 systemd[1]: Finished systemd-journal-flush.service. May 16 00:50:51.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.999260 systemd[1]: Finished systemd-hwdb-update.service. May 16 00:50:51.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:51.999000 audit: BPF prog-id=21 op=LOAD May 16 00:50:51.999000 audit: BPF prog-id=22 op=LOAD May 16 00:50:51.999000 audit: BPF prog-id=7 op=UNLOAD May 16 00:50:51.999000 audit: BPF prog-id=8 op=UNLOAD May 16 00:50:52.001450 systemd[1]: Starting systemd-udevd.service... May 16 00:50:52.025932 systemd-udevd[1032]: Using default interface naming scheme 'v252'. May 16 00:50:52.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.039000 audit: BPF prog-id=23 op=LOAD May 16 00:50:52.038712 systemd[1]: Started systemd-udevd.service. May 16 00:50:52.041081 systemd[1]: Starting systemd-networkd.service... May 16 00:50:52.048000 audit: BPF prog-id=24 op=LOAD May 16 00:50:52.048000 audit: BPF prog-id=25 op=LOAD May 16 00:50:52.048000 audit: BPF prog-id=26 op=LOAD May 16 00:50:52.050291 systemd[1]: Starting systemd-userdbd.service... May 16 00:50:52.055360 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 16 00:50:52.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.083634 systemd[1]: Started systemd-userdbd.service. May 16 00:50:52.101195 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 16 00:50:52.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.143218 systemd[1]: Finished systemd-udev-settle.service. May 16 00:50:52.145049 systemd[1]: Starting lvm2-activation-early.service... May 16 00:50:52.146888 systemd-networkd[1040]: lo: Link UP May 16 00:50:52.146896 systemd-networkd[1040]: lo: Gained carrier May 16 00:50:52.147263 systemd-networkd[1040]: Enumeration completed May 16 00:50:52.147345 systemd[1]: Started systemd-networkd.service. May 16 00:50:52.147472 systemd-networkd[1040]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 16 00:50:52.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.153485 systemd-networkd[1040]: eth0: Link UP May 16 00:50:52.153497 systemd-networkd[1040]: eth0: Gained carrier May 16 00:50:52.157598 lvm[1065]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 16 00:50:52.173781 systemd-networkd[1040]: eth0: DHCPv4 address 10.0.0.127/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 16 00:50:52.189747 systemd[1]: Finished lvm2-activation-early.service. May 16 00:50:52.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.190650 systemd[1]: Reached target cryptsetup.target. May 16 00:50:52.192556 systemd[1]: Starting lvm2-activation.service... May 16 00:50:52.196422 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 16 00:50:52.228664 systemd[1]: Finished lvm2-activation.service. May 16 00:50:52.228000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.229484 systemd[1]: Reached target local-fs-pre.target. May 16 00:50:52.230232 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 16 00:50:52.230263 systemd[1]: Reached target local-fs.target. May 16 00:50:52.230903 systemd[1]: Reached target machines.target. May 16 00:50:52.232663 systemd[1]: Starting ldconfig.service... May 16 00:50:52.233661 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:50:52.233715 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:50:52.234804 systemd[1]: Starting systemd-boot-update.service... May 16 00:50:52.236489 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 16 00:50:52.238479 systemd[1]: Starting systemd-machine-id-commit.service... May 16 00:50:52.241120 systemd[1]: Starting systemd-sysext.service... May 16 00:50:52.244283 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1068 (bootctl) May 16 00:50:52.245360 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 16 00:50:52.253444 systemd[1]: Unmounting usr-share-oem.mount... May 16 00:50:52.257054 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 16 00:50:52.257244 systemd[1]: Unmounted usr-share-oem.mount. May 16 00:50:52.269879 kernel: loop0: detected capacity change from 0 to 203944 May 16 00:50:52.273960 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 16 00:50:52.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.314346 systemd[1]: Finished systemd-machine-id-commit.service. May 16 00:50:52.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.320887 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 16 00:50:52.327201 systemd-fsck[1080]: fsck.fat 4.2 (2021-01-31) May 16 00:50:52.327201 systemd-fsck[1080]: /dev/vda1: 236 files, 117310/258078 clusters May 16 00:50:52.328931 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 16 00:50:52.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.342880 kernel: loop1: detected capacity change from 0 to 203944 May 16 00:50:52.349812 (sd-sysext)[1083]: Using extensions 'kubernetes'. May 16 00:50:52.350749 (sd-sysext)[1083]: Merged extensions into '/usr'. May 16 00:50:52.368659 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:50:52.370211 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:50:52.372011 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:50:52.373992 systemd[1]: Starting modprobe@loop.service... May 16 00:50:52.374721 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:50:52.374906 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:50:52.375736 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:50:52.375903 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:50:52.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.377113 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:50:52.377232 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:50:52.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.378404 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:50:52.378513 systemd[1]: Finished modprobe@loop.service. May 16 00:50:52.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.378000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.380093 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:50:52.380246 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:50:52.409814 ldconfig[1067]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 16 00:50:52.414061 systemd[1]: Finished ldconfig.service. May 16 00:50:52.413000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.601439 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 16 00:50:52.603187 systemd[1]: Mounting boot.mount... May 16 00:50:52.604879 systemd[1]: Mounting usr-share-oem.mount... May 16 00:50:52.610946 systemd[1]: Mounted boot.mount. May 16 00:50:52.611697 systemd[1]: Mounted usr-share-oem.mount. May 16 00:50:52.613428 systemd[1]: Finished systemd-sysext.service. May 16 00:50:52.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.615227 systemd[1]: Starting ensure-sysext.service... May 16 00:50:52.617103 systemd[1]: Starting systemd-tmpfiles-setup.service... May 16 00:50:52.618100 systemd[1]: Finished systemd-boot-update.service. May 16 00:50:52.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.621811 systemd[1]: Reloading. May 16 00:50:52.628105 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 16 00:50:52.629828 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 16 00:50:52.632595 systemd-tmpfiles[1091]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 16 00:50:52.657806 /usr/lib/systemd/system-generators/torcx-generator[1111]: time="2025-05-16T00:50:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:50:52.658139 /usr/lib/systemd/system-generators/torcx-generator[1111]: time="2025-05-16T00:50:52Z" level=info msg="torcx already run" May 16 00:50:52.713213 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:50:52.713225 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:50:52.728244 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:50:52.768000 audit: BPF prog-id=27 op=LOAD May 16 00:50:52.768000 audit: BPF prog-id=24 op=UNLOAD May 16 00:50:52.768000 audit: BPF prog-id=28 op=LOAD May 16 00:50:52.768000 audit: BPF prog-id=29 op=LOAD May 16 00:50:52.768000 audit: BPF prog-id=25 op=UNLOAD May 16 00:50:52.768000 audit: BPF prog-id=26 op=UNLOAD May 16 00:50:52.769000 audit: BPF prog-id=30 op=LOAD May 16 00:50:52.769000 audit: BPF prog-id=23 op=UNLOAD May 16 00:50:52.770000 audit: BPF prog-id=31 op=LOAD May 16 00:50:52.770000 audit: BPF prog-id=18 op=UNLOAD May 16 00:50:52.770000 audit: BPF prog-id=32 op=LOAD May 16 00:50:52.771000 audit: BPF prog-id=33 op=LOAD May 16 00:50:52.771000 audit: BPF prog-id=19 op=UNLOAD May 16 00:50:52.771000 audit: BPF prog-id=20 op=UNLOAD May 16 00:50:52.771000 audit: BPF prog-id=34 op=LOAD May 16 00:50:52.771000 audit: BPF prog-id=35 op=LOAD May 16 00:50:52.771000 audit: BPF prog-id=21 op=UNLOAD May 16 00:50:52.771000 audit: BPF prog-id=22 op=UNLOAD May 16 00:50:52.774757 systemd[1]: Finished systemd-tmpfiles-setup.service. May 16 00:50:52.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.778709 systemd[1]: Starting audit-rules.service... May 16 00:50:52.780494 systemd[1]: Starting clean-ca-certificates.service... May 16 00:50:52.782457 systemd[1]: Starting systemd-journal-catalog-update.service... May 16 00:50:52.783000 audit: BPF prog-id=36 op=LOAD May 16 00:50:52.788000 audit: BPF prog-id=37 op=LOAD May 16 00:50:52.788217 systemd[1]: Starting systemd-resolved.service... May 16 00:50:52.790617 systemd[1]: Starting systemd-timesyncd.service... May 16 00:50:52.792603 systemd[1]: Starting systemd-update-utmp.service... May 16 00:50:52.796000 audit[1160]: SYSTEM_BOOT pid=1160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 16 00:50:52.800062 systemd[1]: Finished clean-ca-certificates.service. May 16 00:50:52.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.801294 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:50:52.802504 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:50:52.804281 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:50:52.806058 systemd[1]: Starting modprobe@loop.service... May 16 00:50:52.806651 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:50:52.806788 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:50:52.806909 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:50:52.807747 systemd[1]: Finished systemd-journal-catalog-update.service. May 16 00:50:52.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.808966 systemd[1]: Finished systemd-update-utmp.service. May 16 00:50:52.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.810028 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:50:52.810140 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:50:52.809000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.809000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.811111 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:50:52.811220 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:50:52.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.812251 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:50:52.812363 systemd[1]: Finished modprobe@loop.service. May 16 00:50:52.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.815033 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:50:52.816277 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:50:52.817988 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:50:52.819637 systemd[1]: Starting modprobe@loop.service... May 16 00:50:52.820410 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:50:52.820559 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:50:52.822044 systemd[1]: Starting systemd-update-done.service... May 16 00:50:52.822682 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:50:52.823536 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:50:52.823916 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:50:52.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.824933 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:50:52.825045 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:50:52.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.826116 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:50:52.826228 systemd[1]: Finished modprobe@loop.service. May 16 00:50:52.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.827197 systemd[1]: Finished systemd-update-done.service. May 16 00:50:52.827000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:52.828383 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:50:52.828485 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:50:52.833170 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:50:52.834443 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:50:52.836190 systemd[1]: Starting modprobe@drm.service... May 16 00:50:52.837924 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:50:52.839608 systemd[1]: Starting modprobe@loop.service... May 16 00:50:52.840363 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:50:52.840491 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:50:52.841689 systemd[1]: Starting systemd-networkd-wait-online.service... May 16 00:50:52.842632 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:50:52.843705 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:50:52.843832 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:50:52.844179 augenrules[1180]: No rules May 16 00:50:52.843000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 16 00:50:52.843000 audit[1180]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc5336980 a2=420 a3=0 items=0 ppid=1149 pid=1180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:52.843000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 16 00:50:52.844920 systemd[1]: Finished audit-rules.service. May 16 00:50:52.845817 systemd[1]: modprobe@drm.service: Deactivated successfully. May 16 00:50:52.845939 systemd[1]: Finished modprobe@drm.service. May 16 00:50:52.846937 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:50:52.847039 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:50:52.848293 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:50:52.848399 systemd[1]: Finished modprobe@loop.service. May 16 00:50:52.849550 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:50:52.849622 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:50:52.850662 systemd[1]: Finished ensure-sysext.service. May 16 00:50:52.852486 systemd-resolved[1153]: Positive Trust Anchors: May 16 00:50:52.852686 systemd-resolved[1153]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 16 00:50:52.852771 systemd-resolved[1153]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 16 00:50:52.854352 systemd[1]: Started systemd-timesyncd.service. May 16 00:50:52.855036 systemd-timesyncd[1154]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 16 00:50:52.855091 systemd-timesyncd[1154]: Initial clock synchronization to Fri 2025-05-16 00:50:52.874698 UTC. May 16 00:50:52.855527 systemd[1]: Reached target time-set.target. May 16 00:50:52.863448 systemd-resolved[1153]: Defaulting to hostname 'linux'. May 16 00:50:52.864847 systemd[1]: Started systemd-resolved.service. May 16 00:50:52.865484 systemd[1]: Reached target network.target. May 16 00:50:52.866134 systemd[1]: Reached target nss-lookup.target. May 16 00:50:52.866699 systemd[1]: Reached target sysinit.target. May 16 00:50:52.867347 systemd[1]: Started motdgen.path. May 16 00:50:52.867896 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 16 00:50:52.868800 systemd[1]: Started logrotate.timer. May 16 00:50:52.869460 systemd[1]: Started mdadm.timer. May 16 00:50:52.870020 systemd[1]: Started systemd-tmpfiles-clean.timer. May 16 00:50:52.870616 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 16 00:50:52.870643 systemd[1]: Reached target paths.target. May 16 00:50:52.871231 systemd[1]: Reached target timers.target. May 16 00:50:52.872064 systemd[1]: Listening on dbus.socket. May 16 00:50:52.873495 systemd[1]: Starting docker.socket... May 16 00:50:52.876367 systemd[1]: Listening on sshd.socket. May 16 00:50:52.877055 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:50:52.877497 systemd[1]: Listening on docker.socket. May 16 00:50:52.878215 systemd[1]: Reached target sockets.target. May 16 00:50:52.878797 systemd[1]: Reached target basic.target. May 16 00:50:52.879423 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 16 00:50:52.879454 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 16 00:50:52.880435 systemd[1]: Starting containerd.service... May 16 00:50:52.882190 systemd[1]: Starting dbus.service... May 16 00:50:52.883712 systemd[1]: Starting enable-oem-cloudinit.service... May 16 00:50:52.885455 systemd[1]: Starting extend-filesystems.service... May 16 00:50:52.886175 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 16 00:50:52.887378 systemd[1]: Starting motdgen.service... May 16 00:50:52.889161 systemd[1]: Starting prepare-helm.service... May 16 00:50:52.891386 jq[1191]: false May 16 00:50:52.892015 systemd[1]: Starting ssh-key-proc-cmdline.service... May 16 00:50:52.893636 systemd[1]: Starting sshd-keygen.service... May 16 00:50:52.896351 systemd[1]: Starting systemd-logind.service... May 16 00:50:52.896948 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:50:52.897029 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 16 00:50:52.897434 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 16 00:50:52.898236 systemd[1]: Starting update-engine.service... May 16 00:50:52.900390 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 16 00:50:52.903302 jq[1205]: true May 16 00:50:52.905625 extend-filesystems[1192]: Found loop1 May 16 00:50:52.906435 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 16 00:50:52.906590 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 16 00:50:52.906716 extend-filesystems[1192]: Found vda May 16 00:50:52.907608 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 16 00:50:52.907757 systemd[1]: Finished ssh-key-proc-cmdline.service. May 16 00:50:52.908796 extend-filesystems[1192]: Found vda1 May 16 00:50:52.909036 systemd[1]: motdgen.service: Deactivated successfully. May 16 00:50:52.909172 systemd[1]: Finished motdgen.service. May 16 00:50:52.909676 extend-filesystems[1192]: Found vda2 May 16 00:50:52.910704 extend-filesystems[1192]: Found vda3 May 16 00:50:52.911432 extend-filesystems[1192]: Found usr May 16 00:50:52.912087 extend-filesystems[1192]: Found vda4 May 16 00:50:52.913114 extend-filesystems[1192]: Found vda6 May 16 00:50:52.914061 extend-filesystems[1192]: Found vda7 May 16 00:50:52.915063 extend-filesystems[1192]: Found vda9 May 16 00:50:52.915063 extend-filesystems[1192]: Checking size of /dev/vda9 May 16 00:50:52.918895 jq[1212]: true May 16 00:50:52.920731 tar[1211]: linux-arm64/helm May 16 00:50:52.928719 dbus-daemon[1190]: [system] SELinux support is enabled May 16 00:50:52.928899 systemd[1]: Started dbus.service. May 16 00:50:52.931179 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 16 00:50:52.931210 systemd[1]: Reached target system-config.target. May 16 00:50:52.931895 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 16 00:50:52.931924 systemd[1]: Reached target user-config.target. May 16 00:50:52.958503 extend-filesystems[1192]: Resized partition /dev/vda9 May 16 00:50:52.961049 extend-filesystems[1240]: resize2fs 1.46.5 (30-Dec-2021) May 16 00:50:52.980561 systemd-logind[1201]: Watching system buttons on /dev/input/event0 (Power Button) May 16 00:50:52.981070 systemd-logind[1201]: New seat seat0. May 16 00:50:52.981872 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 16 00:50:52.984869 systemd[1]: Started systemd-logind.service. May 16 00:50:53.002047 update_engine[1204]: I0516 00:50:53.001713 1204 main.cc:92] Flatcar Update Engine starting May 16 00:50:53.007284 update_engine[1204]: I0516 00:50:53.005743 1204 update_check_scheduler.cc:74] Next update check in 11m22s May 16 00:50:53.005721 systemd[1]: Started update-engine.service. May 16 00:50:53.008615 systemd[1]: Started locksmithd.service. May 16 00:50:53.013296 env[1213]: time="2025-05-16T00:50:53.013050155Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 16 00:50:53.015873 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 16 00:50:53.017078 bash[1239]: Updated "/home/core/.ssh/authorized_keys" May 16 00:50:53.018098 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 16 00:50:53.032221 extend-filesystems[1240]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 16 00:50:53.032221 extend-filesystems[1240]: old_desc_blocks = 1, new_desc_blocks = 1 May 16 00:50:53.032221 extend-filesystems[1240]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 16 00:50:53.036977 extend-filesystems[1192]: Resized filesystem in /dev/vda9 May 16 00:50:53.034313 systemd[1]: extend-filesystems.service: Deactivated successfully. May 16 00:50:53.037971 env[1213]: time="2025-05-16T00:50:53.037395601Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 16 00:50:53.037971 env[1213]: time="2025-05-16T00:50:53.037551193Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 16 00:50:53.034463 systemd[1]: Finished extend-filesystems.service. May 16 00:50:53.038764 env[1213]: time="2025-05-16T00:50:53.038683188Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 16 00:50:53.038764 env[1213]: time="2025-05-16T00:50:53.038717230Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 16 00:50:53.039111 env[1213]: time="2025-05-16T00:50:53.039059051Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 16 00:50:53.039111 env[1213]: time="2025-05-16T00:50:53.039084843Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 16 00:50:53.039111 env[1213]: time="2025-05-16T00:50:53.039098860Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 16 00:50:53.039111 env[1213]: time="2025-05-16T00:50:53.039108312Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 16 00:50:53.039213 env[1213]: time="2025-05-16T00:50:53.039189412Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 16 00:50:53.039411 env[1213]: time="2025-05-16T00:50:53.039388177Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 16 00:50:53.039534 env[1213]: time="2025-05-16T00:50:53.039515614Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 16 00:50:53.039534 env[1213]: time="2025-05-16T00:50:53.039534357Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 16 00:50:53.039602 env[1213]: time="2025-05-16T00:50:53.039586581Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 16 00:50:53.039629 env[1213]: time="2025-05-16T00:50:53.039602601Z" level=info msg="metadata content store policy set" policy=shared May 16 00:50:53.045358 env[1213]: time="2025-05-16T00:50:53.045322691Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 16 00:50:53.045358 env[1213]: time="2025-05-16T00:50:53.045360217Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 16 00:50:53.045456 env[1213]: time="2025-05-16T00:50:53.045374675Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 16 00:50:53.045456 env[1213]: time="2025-05-16T00:50:53.045409198Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045456 env[1213]: time="2025-05-16T00:50:53.045423936Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045456 env[1213]: time="2025-05-16T00:50:53.045436912Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045456 env[1213]: time="2025-05-16T00:50:53.045449207Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045830 env[1213]: time="2025-05-16T00:50:53.045796275Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045830 env[1213]: time="2025-05-16T00:50:53.045832479Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045920 env[1213]: time="2025-05-16T00:50:53.045848339Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045920 env[1213]: time="2025-05-16T00:50:53.045879177Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 16 00:50:53.045920 env[1213]: time="2025-05-16T00:50:53.045892754Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 16 00:50:53.046066 env[1213]: time="2025-05-16T00:50:53.046002369Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 16 00:50:53.046104 env[1213]: time="2025-05-16T00:50:53.046080385Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 16 00:50:53.046346 env[1213]: time="2025-05-16T00:50:53.046327369Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 16 00:50:53.046374 env[1213]: time="2025-05-16T00:50:53.046357807Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046374 env[1213]: time="2025-05-16T00:50:53.046371744Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 16 00:50:53.046528 env[1213]: time="2025-05-16T00:50:53.046481439Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046528 env[1213]: time="2025-05-16T00:50:53.046497659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046528 env[1213]: time="2025-05-16T00:50:53.046510675Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046528 env[1213]: time="2025-05-16T00:50:53.046521769Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046641 env[1213]: time="2025-05-16T00:50:53.046581923Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046641 env[1213]: time="2025-05-16T00:50:53.046595820Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046641 env[1213]: time="2025-05-16T00:50:53.046606794Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046641 env[1213]: time="2025-05-16T00:50:53.046617847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046641 env[1213]: time="2025-05-16T00:50:53.046631664Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 16 00:50:53.046827 env[1213]: time="2025-05-16T00:50:53.046748328Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046827 env[1213]: time="2025-05-16T00:50:53.046771396Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046827 env[1213]: time="2025-05-16T00:50:53.046784092Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 16 00:50:53.046827 env[1213]: time="2025-05-16T00:50:53.046795506Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 16 00:50:53.046827 env[1213]: time="2025-05-16T00:50:53.046808963Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 16 00:50:53.046827 env[1213]: time="2025-05-16T00:50:53.046828467Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 16 00:50:53.046983 env[1213]: time="2025-05-16T00:50:53.046846609Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 16 00:50:53.046983 env[1213]: time="2025-05-16T00:50:53.046892426Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 16 00:50:53.047140 env[1213]: time="2025-05-16T00:50:53.047079817Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 16 00:50:53.047802 env[1213]: time="2025-05-16T00:50:53.047139931Z" level=info msg="Connect containerd service" May 16 00:50:53.047802 env[1213]: time="2025-05-16T00:50:53.047168686Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 16 00:50:53.047974 env[1213]: time="2025-05-16T00:50:53.047921334Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048268642Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048310894Z" level=info msg=serving... address=/run/containerd/containerd.sock May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048369526Z" level=info msg="Start subscribing containerd event" May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048423833Z" level=info msg="Start recovering state" May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048481104Z" level=info msg="Start event monitor" May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048499727Z" level=info msg="Start snapshots syncer" May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048508658Z" level=info msg="Start cni network conf syncer for default" May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.048516027Z" level=info msg="Start streaming server" May 16 00:50:53.049534 env[1213]: time="2025-05-16T00:50:53.049198628Z" level=info msg="containerd successfully booted in 0.039507s" May 16 00:50:53.048412 systemd[1]: Started containerd.service. May 16 00:50:53.071285 locksmithd[1242]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 16 00:50:53.318462 tar[1211]: linux-arm64/LICENSE May 16 00:50:53.318663 tar[1211]: linux-arm64/README.md May 16 00:50:53.322922 systemd[1]: Finished prepare-helm.service. May 16 00:50:53.428061 systemd-networkd[1040]: eth0: Gained IPv6LL May 16 00:50:53.429742 systemd[1]: Finished systemd-networkd-wait-online.service. May 16 00:50:53.430745 systemd[1]: Reached target network-online.target. May 16 00:50:53.432899 systemd[1]: Starting kubelet.service... May 16 00:50:54.023527 systemd[1]: Started kubelet.service. May 16 00:50:54.451452 kubelet[1259]: E0516 00:50:54.451354 1259 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:50:54.453778 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:50:54.453917 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:50:55.833239 sshd_keygen[1214]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 16 00:50:55.850385 systemd[1]: Finished sshd-keygen.service. May 16 00:50:55.852536 systemd[1]: Starting issuegen.service... May 16 00:50:55.856955 systemd[1]: issuegen.service: Deactivated successfully. May 16 00:50:55.857108 systemd[1]: Finished issuegen.service. May 16 00:50:55.859123 systemd[1]: Starting systemd-user-sessions.service... May 16 00:50:55.866834 systemd[1]: Finished systemd-user-sessions.service. May 16 00:50:55.868892 systemd[1]: Started getty@tty1.service. May 16 00:50:55.870727 systemd[1]: Started serial-getty@ttyAMA0.service. May 16 00:50:55.871707 systemd[1]: Reached target getty.target. May 16 00:50:55.872412 systemd[1]: Reached target multi-user.target. May 16 00:50:55.874195 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 16 00:50:55.880416 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 16 00:50:55.880563 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 16 00:50:55.881427 systemd[1]: Startup finished in 588ms (kernel) + 5.090s (initrd) + 6.213s (userspace) = 11.892s. May 16 00:50:57.413884 systemd[1]: Created slice system-sshd.slice. May 16 00:50:57.414893 systemd[1]: Started sshd@0-10.0.0.127:22-10.0.0.1:35574.service. May 16 00:50:57.457066 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 35574 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:50:57.458809 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:57.466169 systemd[1]: Created slice user-500.slice. May 16 00:50:57.467136 systemd[1]: Starting user-runtime-dir@500.service... May 16 00:50:57.468733 systemd-logind[1201]: New session 1 of user core. May 16 00:50:57.474992 systemd[1]: Finished user-runtime-dir@500.service. May 16 00:50:57.476157 systemd[1]: Starting user@500.service... May 16 00:50:57.478815 (systemd)[1284]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:57.535647 systemd[1284]: Queued start job for default target default.target. May 16 00:50:57.536118 systemd[1284]: Reached target paths.target. May 16 00:50:57.536151 systemd[1284]: Reached target sockets.target. May 16 00:50:57.536163 systemd[1284]: Reached target timers.target. May 16 00:50:57.536173 systemd[1284]: Reached target basic.target. May 16 00:50:57.536210 systemd[1284]: Reached target default.target. May 16 00:50:57.536234 systemd[1284]: Startup finished in 52ms. May 16 00:50:57.536397 systemd[1]: Started user@500.service. May 16 00:50:57.537239 systemd[1]: Started session-1.scope. May 16 00:50:57.587177 systemd[1]: Started sshd@1-10.0.0.127:22-10.0.0.1:35580.service. May 16 00:50:57.632255 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 35580 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:50:57.633588 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:57.637547 systemd-logind[1201]: New session 2 of user core. May 16 00:50:57.638232 systemd[1]: Started session-2.scope. May 16 00:50:57.691228 sshd[1293]: pam_unix(sshd:session): session closed for user core May 16 00:50:57.693366 systemd[1]: sshd@1-10.0.0.127:22-10.0.0.1:35580.service: Deactivated successfully. May 16 00:50:57.693977 systemd[1]: session-2.scope: Deactivated successfully. May 16 00:50:57.694447 systemd-logind[1201]: Session 2 logged out. Waiting for processes to exit. May 16 00:50:57.695362 systemd[1]: Started sshd@2-10.0.0.127:22-10.0.0.1:35586.service. May 16 00:50:57.695968 systemd-logind[1201]: Removed session 2. May 16 00:50:57.726766 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 35586 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:50:57.727801 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:57.731088 systemd-logind[1201]: New session 3 of user core. May 16 00:50:57.731362 systemd[1]: Started session-3.scope. May 16 00:50:57.780431 sshd[1299]: pam_unix(sshd:session): session closed for user core May 16 00:50:57.782690 systemd[1]: sshd@2-10.0.0.127:22-10.0.0.1:35586.service: Deactivated successfully. May 16 00:50:57.783229 systemd[1]: session-3.scope: Deactivated successfully. May 16 00:50:57.783644 systemd-logind[1201]: Session 3 logged out. Waiting for processes to exit. May 16 00:50:57.784588 systemd[1]: Started sshd@3-10.0.0.127:22-10.0.0.1:35588.service. May 16 00:50:57.785243 systemd-logind[1201]: Removed session 3. May 16 00:50:57.815809 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 35588 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:50:57.817134 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:57.819915 systemd-logind[1201]: New session 4 of user core. May 16 00:50:57.820592 systemd[1]: Started session-4.scope. May 16 00:50:57.872223 sshd[1306]: pam_unix(sshd:session): session closed for user core May 16 00:50:57.874404 systemd[1]: sshd@3-10.0.0.127:22-10.0.0.1:35588.service: Deactivated successfully. May 16 00:50:57.874904 systemd[1]: session-4.scope: Deactivated successfully. May 16 00:50:57.875349 systemd-logind[1201]: Session 4 logged out. Waiting for processes to exit. May 16 00:50:57.876250 systemd[1]: Started sshd@4-10.0.0.127:22-10.0.0.1:35590.service. May 16 00:50:57.876823 systemd-logind[1201]: Removed session 4. May 16 00:50:57.906567 sshd[1312]: Accepted publickey for core from 10.0.0.1 port 35590 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:50:57.907879 sshd[1312]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:57.910730 systemd-logind[1201]: New session 5 of user core. May 16 00:50:57.911425 systemd[1]: Started session-5.scope. May 16 00:50:57.965945 sudo[1315]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 16 00:50:57.966154 sudo[1315]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:50:57.983041 dbus-daemon[1190]: avc: received setenforce notice (enforcing=1) May 16 00:50:57.984732 sudo[1315]: pam_unix(sudo:session): session closed for user root May 16 00:50:57.986615 sshd[1312]: pam_unix(sshd:session): session closed for user core May 16 00:50:57.990437 systemd[1]: sshd@4-10.0.0.127:22-10.0.0.1:35590.service: Deactivated successfully. May 16 00:50:57.991002 systemd[1]: session-5.scope: Deactivated successfully. May 16 00:50:57.991496 systemd-logind[1201]: Session 5 logged out. Waiting for processes to exit. May 16 00:50:57.992526 systemd[1]: Started sshd@5-10.0.0.127:22-10.0.0.1:35604.service. May 16 00:50:57.993129 systemd-logind[1201]: Removed session 5. May 16 00:50:58.023921 sshd[1319]: Accepted publickey for core from 10.0.0.1 port 35604 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:50:58.024997 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:58.028667 systemd[1]: Started session-6.scope. May 16 00:50:58.028922 systemd-logind[1201]: New session 6 of user core. May 16 00:50:58.079946 sudo[1324]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 16 00:50:58.080155 sudo[1324]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:50:58.082622 sudo[1324]: pam_unix(sudo:session): session closed for user root May 16 00:50:58.086727 sudo[1323]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 16 00:50:58.086955 sudo[1323]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:50:58.094535 systemd[1]: Stopping audit-rules.service... May 16 00:50:58.094000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 16 00:50:58.096090 kernel: kauditd_printk_skb: 167 callbacks suppressed May 16 00:50:58.096139 kernel: audit: type=1305 audit(1747356658.094:200): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 16 00:50:58.096331 auditctl[1327]: No rules May 16 00:50:58.096704 systemd[1]: audit-rules.service: Deactivated successfully. May 16 00:50:58.096891 systemd[1]: Stopped audit-rules.service. May 16 00:50:58.094000 audit[1327]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd2583430 a2=420 a3=0 items=0 ppid=1 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.098223 systemd[1]: Starting audit-rules.service... May 16 00:50:58.099869 kernel: audit: type=1300 audit(1747356658.094:200): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd2583430 a2=420 a3=0 items=0 ppid=1 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.099927 kernel: audit: type=1327 audit(1747356658.094:200): proctitle=2F7362696E2F617564697463746C002D44 May 16 00:50:58.094000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 16 00:50:58.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.102426 kernel: audit: type=1131 audit(1747356658.096:201): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.113925 augenrules[1344]: No rules May 16 00:50:58.114591 systemd[1]: Finished audit-rules.service. May 16 00:50:58.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.115774 sudo[1323]: pam_unix(sudo:session): session closed for user root May 16 00:50:58.114000 audit[1323]: USER_END pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:50:58.117618 sshd[1319]: pam_unix(sshd:session): session closed for user core May 16 00:50:58.119797 kernel: audit: type=1130 audit(1747356658.113:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.119868 kernel: audit: type=1106 audit(1747356658.114:203): pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:50:58.119905 kernel: audit: type=1104 audit(1747356658.115:204): pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:50:58.115000 audit[1323]: CRED_DISP pid=1323 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:50:58.119987 systemd[1]: sshd@5-10.0.0.127:22-10.0.0.1:35604.service: Deactivated successfully. May 16 00:50:58.120548 systemd[1]: session-6.scope: Deactivated successfully. May 16 00:50:58.121137 systemd-logind[1201]: Session 6 logged out. Waiting for processes to exit. May 16 00:50:58.121210 kernel: audit: type=1106 audit(1747356658.117:205): pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.117000 audit[1319]: USER_END pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.122129 systemd[1]: Started sshd@6-10.0.0.127:22-10.0.0.1:35610.service. May 16 00:50:58.122844 systemd-logind[1201]: Removed session 6. May 16 00:50:58.123647 kernel: audit: type=1104 audit(1747356658.117:206): pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.117000 audit[1319]: CRED_DISP pid=1319 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.125655 kernel: audit: type=1131 audit(1747356658.119:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.127:22-10.0.0.1:35604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.127:22-10.0.0.1:35604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.127:22-10.0.0.1:35610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.152000 audit[1350]: USER_ACCT pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.153326 sshd[1350]: Accepted publickey for core from 10.0.0.1 port 35610 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:50:58.153000 audit[1350]: CRED_ACQ pid=1350 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.153000 audit[1350]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebfb52f0 a2=3 a3=1 items=0 ppid=1 pid=1350 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.153000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:50:58.154405 sshd[1350]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:50:58.157729 systemd-logind[1201]: New session 7 of user core. May 16 00:50:58.158134 systemd[1]: Started session-7.scope. May 16 00:50:58.161000 audit[1350]: USER_START pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.162000 audit[1352]: CRED_ACQ pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:50:58.209000 audit[1353]: USER_ACCT pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:50:58.210314 sudo[1353]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 16 00:50:58.210545 sudo[1353]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:50:58.209000 audit[1353]: CRED_REFR pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:50:58.211000 audit[1353]: USER_START pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:50:58.272895 systemd[1]: Starting docker.service... May 16 00:50:58.356693 env[1365]: time="2025-05-16T00:50:58.356638678Z" level=info msg="Starting up" May 16 00:50:58.358284 env[1365]: time="2025-05-16T00:50:58.358260886Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 16 00:50:58.358284 env[1365]: time="2025-05-16T00:50:58.358282425Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 16 00:50:58.358418 env[1365]: time="2025-05-16T00:50:58.358301562Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 16 00:50:58.358418 env[1365]: time="2025-05-16T00:50:58.358312052Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 16 00:50:58.360332 env[1365]: time="2025-05-16T00:50:58.360307393Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 16 00:50:58.360450 env[1365]: time="2025-05-16T00:50:58.360417732Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 16 00:50:58.360534 env[1365]: time="2025-05-16T00:50:58.360501367Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 16 00:50:58.360611 env[1365]: time="2025-05-16T00:50:58.360584561Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 16 00:50:58.558477 env[1365]: time="2025-05-16T00:50:58.558391979Z" level=info msg="Loading containers: start." May 16 00:50:58.601000 audit[1399]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.601000 audit[1399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffef04e780 a2=0 a3=1 items=0 ppid=1365 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.601000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 16 00:50:58.602000 audit[1401]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.602000 audit[1401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff1873290 a2=0 a3=1 items=0 ppid=1365 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 16 00:50:58.604000 audit[1403]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.604000 audit[1403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc858c680 a2=0 a3=1 items=0 ppid=1365 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.604000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 16 00:50:58.606000 audit[1405]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.606000 audit[1405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc83d55b0 a2=0 a3=1 items=0 ppid=1365 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 16 00:50:58.609000 audit[1407]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.609000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe97211a0 a2=0 a3=1 items=0 ppid=1365 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.609000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 16 00:50:58.632000 audit[1412]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.632000 audit[1412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff43eb100 a2=0 a3=1 items=0 ppid=1365 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.632000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 16 00:50:58.638000 audit[1414]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.638000 audit[1414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff4ba7400 a2=0 a3=1 items=0 ppid=1365 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 16 00:50:58.640000 audit[1416]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.640000 audit[1416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffda853a50 a2=0 a3=1 items=0 ppid=1365 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.640000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 16 00:50:58.641000 audit[1418]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.641000 audit[1418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc5ded9f0 a2=0 a3=1 items=0 ppid=1365 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:50:58.648000 audit[1422]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.648000 audit[1422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd2863560 a2=0 a3=1 items=0 ppid=1365 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 16 00:50:58.658000 audit[1423]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.658000 audit[1423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc92f72e0 a2=0 a3=1 items=0 ppid=1365 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:50:58.668885 kernel: Initializing XFRM netlink socket May 16 00:50:58.692865 env[1365]: time="2025-05-16T00:50:58.692801470Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 16 00:50:58.708000 audit[1431]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.708000 audit[1431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc2355b60 a2=0 a3=1 items=0 ppid=1365 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.708000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 16 00:50:58.727000 audit[1434]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.727000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffffb4ae8c0 a2=0 a3=1 items=0 ppid=1365 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 16 00:50:58.730000 audit[1437]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.730000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffec186fd0 a2=0 a3=1 items=0 ppid=1365 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 16 00:50:58.732000 audit[1439]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.732000 audit[1439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcd6a0f90 a2=0 a3=1 items=0 ppid=1365 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.732000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 16 00:50:58.734000 audit[1441]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.734000 audit[1441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffc479a980 a2=0 a3=1 items=0 ppid=1365 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.734000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 16 00:50:58.736000 audit[1443]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.736000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd21ecc20 a2=0 a3=1 items=0 ppid=1365 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.736000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 16 00:50:58.738000 audit[1445]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.738000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe6e436b0 a2=0 a3=1 items=0 ppid=1365 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 16 00:50:58.746000 audit[1448]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.746000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff5dbaf80 a2=0 a3=1 items=0 ppid=1365 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 16 00:50:58.748000 audit[1450]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.748000 audit[1450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff352ec40 a2=0 a3=1 items=0 ppid=1365 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.748000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 16 00:50:58.750000 audit[1452]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.750000 audit[1452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff6571c60 a2=0 a3=1 items=0 ppid=1365 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.750000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 16 00:50:58.751000 audit[1454]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.751000 audit[1454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe36bcc60 a2=0 a3=1 items=0 ppid=1365 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.751000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 16 00:50:58.753271 systemd-networkd[1040]: docker0: Link UP May 16 00:50:58.759000 audit[1458]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1458 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.759000 audit[1458]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe1c2ebf0 a2=0 a3=1 items=0 ppid=1365 pid=1458 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 16 00:50:58.767000 audit[1459]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:50:58.767000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff0e829f0 a2=0 a3=1 items=0 ppid=1365 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:50:58.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:50:58.769059 env[1365]: time="2025-05-16T00:50:58.769012597Z" level=info msg="Loading containers: done." May 16 00:50:58.783131 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2438565948-merged.mount: Deactivated successfully. May 16 00:50:58.790152 env[1365]: time="2025-05-16T00:50:58.790113798Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 16 00:50:58.790465 env[1365]: time="2025-05-16T00:50:58.790437287Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 16 00:50:58.790622 env[1365]: time="2025-05-16T00:50:58.790604917Z" level=info msg="Daemon has completed initialization" May 16 00:50:58.804769 systemd[1]: Started docker.service. May 16 00:50:58.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:50:58.812238 env[1365]: time="2025-05-16T00:50:58.812057191Z" level=info msg="API listen on /run/docker.sock" May 16 00:50:59.543203 env[1213]: time="2025-05-16T00:50:59.543146528Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\"" May 16 00:51:00.251078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4192585398.mount: Deactivated successfully. May 16 00:51:01.463382 env[1213]: time="2025-05-16T00:51:01.463331758Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:01.464926 env[1213]: time="2025-05-16T00:51:01.464898631Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:90d52158b7646075e7e560c1bd670904ba3f4f4c8c199106bf96ee0944663d61,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:01.466636 env[1213]: time="2025-05-16T00:51:01.466615695Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:01.468538 env[1213]: time="2025-05-16T00:51:01.468498440Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:01.470873 env[1213]: time="2025-05-16T00:51:01.470814824Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\" returns image reference \"sha256:90d52158b7646075e7e560c1bd670904ba3f4f4c8c199106bf96ee0944663d61\"" May 16 00:51:01.473953 env[1213]: time="2025-05-16T00:51:01.473926954Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\"" May 16 00:51:02.879106 env[1213]: time="2025-05-16T00:51:02.879059905Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:02.880482 env[1213]: time="2025-05-16T00:51:02.880449103Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d03fe540daca1d9520c403342787715eab3b05fb6773ea41153572716c82dba,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:02.882296 env[1213]: time="2025-05-16T00:51:02.882262074Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:02.884148 env[1213]: time="2025-05-16T00:51:02.884119996Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:02.884963 env[1213]: time="2025-05-16T00:51:02.884936639Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\" returns image reference \"sha256:2d03fe540daca1d9520c403342787715eab3b05fb6773ea41153572716c82dba\"" May 16 00:51:02.885411 env[1213]: time="2025-05-16T00:51:02.885383867Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\"" May 16 00:51:04.119363 env[1213]: time="2025-05-16T00:51:04.119316786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:04.120702 env[1213]: time="2025-05-16T00:51:04.120674609Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b333fec06af219faaf48f1784baa0b7274945b2e5be5bd2fca2681f7d1baff5f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:04.122413 env[1213]: time="2025-05-16T00:51:04.122385246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:04.124017 env[1213]: time="2025-05-16T00:51:04.123987218Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:04.124804 env[1213]: time="2025-05-16T00:51:04.124780099Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\" returns image reference \"sha256:b333fec06af219faaf48f1784baa0b7274945b2e5be5bd2fca2681f7d1baff5f\"" May 16 00:51:04.125227 env[1213]: time="2025-05-16T00:51:04.125197592Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 16 00:51:04.704684 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 16 00:51:04.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:04.704868 systemd[1]: Stopped kubelet.service. May 16 00:51:04.706304 systemd[1]: Starting kubelet.service... May 16 00:51:04.707220 kernel: kauditd_printk_skb: 84 callbacks suppressed May 16 00:51:04.707270 kernel: audit: type=1130 audit(1747356664.704:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:04.707292 kernel: audit: type=1131 audit(1747356664.704:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:04.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:04.802207 systemd[1]: Started kubelet.service. May 16 00:51:04.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:04.806899 kernel: audit: type=1130 audit(1747356664.802:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:04.886898 kubelet[1500]: E0516 00:51:04.886829 1500 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:51:04.889732 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:51:04.889899 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:51:04.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:51:04.892879 kernel: audit: type=1131 audit(1747356664.889:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:51:05.213731 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3339056872.mount: Deactivated successfully. May 16 00:51:05.792820 env[1213]: time="2025-05-16T00:51:05.792772339Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:05.794128 env[1213]: time="2025-05-16T00:51:05.794098813Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbfba5e6542fe387b24d9e73bf5a054a6b07b95af1392268fd82b6f449ef1c27,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:05.795094 env[1213]: time="2025-05-16T00:51:05.795073167Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:05.796498 env[1213]: time="2025-05-16T00:51:05.796460676Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:05.796994 env[1213]: time="2025-05-16T00:51:05.796964522Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:cbfba5e6542fe387b24d9e73bf5a054a6b07b95af1392268fd82b6f449ef1c27\"" May 16 00:51:05.797896 env[1213]: time="2025-05-16T00:51:05.797874920Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 16 00:51:06.382946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount56721595.mount: Deactivated successfully. May 16 00:51:07.280200 env[1213]: time="2025-05-16T00:51:07.280149987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.281692 env[1213]: time="2025-05-16T00:51:07.281656860Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.283446 env[1213]: time="2025-05-16T00:51:07.283424503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.285225 env[1213]: time="2025-05-16T00:51:07.285200151Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.286108 env[1213]: time="2025-05-16T00:51:07.286082031Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 16 00:51:07.286597 env[1213]: time="2025-05-16T00:51:07.286571796Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 16 00:51:07.804505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2242215656.mount: Deactivated successfully. May 16 00:51:07.807971 env[1213]: time="2025-05-16T00:51:07.807928755Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.809093 env[1213]: time="2025-05-16T00:51:07.809051436Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.810671 env[1213]: time="2025-05-16T00:51:07.810635828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.812300 env[1213]: time="2025-05-16T00:51:07.812261881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:07.812894 env[1213]: time="2025-05-16T00:51:07.812859459Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 16 00:51:07.813335 env[1213]: time="2025-05-16T00:51:07.813299999Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 16 00:51:08.425078 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2089501715.mount: Deactivated successfully. May 16 00:51:10.746193 env[1213]: time="2025-05-16T00:51:10.746142180Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:10.750963 env[1213]: time="2025-05-16T00:51:10.750920828Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:10.760818 env[1213]: time="2025-05-16T00:51:10.760782889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:10.764223 env[1213]: time="2025-05-16T00:51:10.764185530Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:10.765195 env[1213]: time="2025-05-16T00:51:10.765160091Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" May 16 00:51:15.050282 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 16 00:51:15.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.050453 systemd[1]: Stopped kubelet.service. May 16 00:51:15.051796 systemd[1]: Starting kubelet.service... May 16 00:51:15.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.054153 kernel: audit: type=1130 audit(1747356675.048:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.054207 kernel: audit: type=1131 audit(1747356675.048:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.145139 kernel: audit: type=1130 audit(1747356675.142:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.142682 systemd[1]: Started kubelet.service. May 16 00:51:15.177908 kubelet[1533]: E0516 00:51:15.177877 1533 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:51:15.179943 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:51:15.180059 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:51:15.179000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:51:15.182890 kernel: audit: type=1131 audit(1747356675.179:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:51:15.470396 systemd[1]: Stopped kubelet.service. May 16 00:51:15.469000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.472448 systemd[1]: Starting kubelet.service... May 16 00:51:15.474578 kernel: audit: type=1130 audit(1747356675.469:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.474635 kernel: audit: type=1131 audit(1747356675.469:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.491670 systemd[1]: Reloading. May 16 00:51:15.535259 /usr/lib/systemd/system-generators/torcx-generator[1569]: time="2025-05-16T00:51:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:51:15.535291 /usr/lib/systemd/system-generators/torcx-generator[1569]: time="2025-05-16T00:51:15Z" level=info msg="torcx already run" May 16 00:51:15.694126 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:51:15.694144 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:51:15.709383 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:51:15.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.760742 kernel: audit: type=1400 audit(1747356675.756:252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.760783 kernel: audit: type=1400 audit(1747356675.756:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.760804 kernel: audit: type=1400 audit(1747356675.756:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.762430 kernel: audit: type=1400 audit(1747356675.756:255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.756000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.758000 audit: BPF prog-id=43 op=LOAD May 16 00:51:15.758000 audit: BPF prog-id=41 op=UNLOAD May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit: BPF prog-id=44 op=LOAD May 16 00:51:15.759000 audit: BPF prog-id=27 op=UNLOAD May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.759000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit: BPF prog-id=45 op=LOAD May 16 00:51:15.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.763000 audit: BPF prog-id=46 op=LOAD May 16 00:51:15.763000 audit: BPF prog-id=28 op=UNLOAD May 16 00:51:15.763000 audit: BPF prog-id=29 op=UNLOAD May 16 00:51:15.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.764000 audit: BPF prog-id=47 op=LOAD May 16 00:51:15.764000 audit: BPF prog-id=30 op=UNLOAD May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit: BPF prog-id=48 op=LOAD May 16 00:51:15.765000 audit: BPF prog-id=36 op=UNLOAD May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit: BPF prog-id=49 op=LOAD May 16 00:51:15.766000 audit: BPF prog-id=31 op=UNLOAD May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit: BPF prog-id=50 op=LOAD May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.766000 audit: BPF prog-id=51 op=LOAD May 16 00:51:15.766000 audit: BPF prog-id=32 op=UNLOAD May 16 00:51:15.766000 audit: BPF prog-id=33 op=UNLOAD May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit: BPF prog-id=52 op=LOAD May 16 00:51:15.767000 audit: BPF prog-id=38 op=UNLOAD May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit: BPF prog-id=53 op=LOAD May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.767000 audit: BPF prog-id=54 op=LOAD May 16 00:51:15.767000 audit: BPF prog-id=39 op=UNLOAD May 16 00:51:15.767000 audit: BPF prog-id=40 op=UNLOAD May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit: BPF prog-id=55 op=LOAD May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.768000 audit: BPF prog-id=56 op=LOAD May 16 00:51:15.768000 audit: BPF prog-id=34 op=UNLOAD May 16 00:51:15.768000 audit: BPF prog-id=35 op=UNLOAD May 16 00:51:15.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:15.769000 audit: BPF prog-id=57 op=LOAD May 16 00:51:15.769000 audit: BPF prog-id=37 op=UNLOAD May 16 00:51:15.777955 systemd[1]: Started kubelet.service. May 16 00:51:15.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.780963 systemd[1]: Stopping kubelet.service... May 16 00:51:15.781491 systemd[1]: kubelet.service: Deactivated successfully. May 16 00:51:15.781731 systemd[1]: Stopped kubelet.service. May 16 00:51:15.780000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.783256 systemd[1]: Starting kubelet.service... May 16 00:51:15.874437 systemd[1]: Started kubelet.service. May 16 00:51:15.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:15.916609 kubelet[1617]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:51:15.916609 kubelet[1617]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 16 00:51:15.916609 kubelet[1617]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:51:15.916907 kubelet[1617]: I0516 00:51:15.916660 1617 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 16 00:51:16.471910 kubelet[1617]: I0516 00:51:16.471882 1617 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 16 00:51:16.472094 kubelet[1617]: I0516 00:51:16.472084 1617 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 16 00:51:16.472387 kubelet[1617]: I0516 00:51:16.472372 1617 server.go:934] "Client rotation is on, will bootstrap in background" May 16 00:51:16.510601 kubelet[1617]: E0516 00:51:16.510564 1617 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.127:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.127:6443: connect: connection refused" logger="UnhandledError" May 16 00:51:16.511644 kubelet[1617]: I0516 00:51:16.511621 1617 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 16 00:51:16.516710 kubelet[1617]: E0516 00:51:16.516686 1617 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 16 00:51:16.516788 kubelet[1617]: I0516 00:51:16.516732 1617 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 16 00:51:16.520375 kubelet[1617]: I0516 00:51:16.520361 1617 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 16 00:51:16.521177 kubelet[1617]: I0516 00:51:16.521155 1617 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 16 00:51:16.521330 kubelet[1617]: I0516 00:51:16.521310 1617 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 16 00:51:16.521479 kubelet[1617]: I0516 00:51:16.521331 1617 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 16 00:51:16.521553 kubelet[1617]: I0516 00:51:16.521546 1617 topology_manager.go:138] "Creating topology manager with none policy" May 16 00:51:16.521579 kubelet[1617]: I0516 00:51:16.521554 1617 container_manager_linux.go:300] "Creating device plugin manager" May 16 00:51:16.521785 kubelet[1617]: I0516 00:51:16.521761 1617 state_mem.go:36] "Initialized new in-memory state store" May 16 00:51:16.527378 kubelet[1617]: I0516 00:51:16.527359 1617 kubelet.go:408] "Attempting to sync node with API server" May 16 00:51:16.527443 kubelet[1617]: I0516 00:51:16.527408 1617 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 16 00:51:16.527443 kubelet[1617]: I0516 00:51:16.527433 1617 kubelet.go:314] "Adding apiserver pod source" May 16 00:51:16.527503 kubelet[1617]: I0516 00:51:16.527447 1617 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 16 00:51:16.528127 kubelet[1617]: W0516 00:51:16.528012 1617 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.127:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 16 00:51:16.528202 kubelet[1617]: E0516 00:51:16.528132 1617 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.127:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.127:6443: connect: connection refused" logger="UnhandledError" May 16 00:51:16.528321 kubelet[1617]: W0516 00:51:16.528286 1617 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 16 00:51:16.528406 kubelet[1617]: E0516 00:51:16.528390 1617 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.127:6443: connect: connection refused" logger="UnhandledError" May 16 00:51:16.530890 kubelet[1617]: I0516 00:51:16.530871 1617 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 16 00:51:16.531883 kubelet[1617]: I0516 00:51:16.531866 1617 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 16 00:51:16.532130 kubelet[1617]: W0516 00:51:16.532113 1617 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 16 00:51:16.533240 kubelet[1617]: I0516 00:51:16.533215 1617 server.go:1274] "Started kubelet" May 16 00:51:16.535736 kubelet[1617]: I0516 00:51:16.535708 1617 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 16 00:51:16.536000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:16.536000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:51:16.536000 audit[1617]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40009f49c0 a1=4000d123d8 a2=40009f4990 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:51:16.537822 kubelet[1617]: I0516 00:51:16.537804 1617 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 16 00:51:16.537000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:16.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:51:16.537000 audit[1617]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000501f40 a1=4000d123f0 a2=40009f4a50 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:51:16.538333 kubelet[1617]: I0516 00:51:16.538103 1617 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 16 00:51:16.538555 kubelet[1617]: I0516 00:51:16.538472 1617 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 16 00:51:16.538643 kubelet[1617]: I0516 00:51:16.538631 1617 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 16 00:51:16.538735 kubelet[1617]: I0516 00:51:16.538713 1617 server.go:449] "Adding debug handlers to kubelet server" May 16 00:51:16.538735 kubelet[1617]: I0516 00:51:16.538726 1617 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 16 00:51:16.544131 kubelet[1617]: I0516 00:51:16.544113 1617 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 16 00:51:16.545292 kubelet[1617]: I0516 00:51:16.545277 1617 volume_manager.go:289] "Starting Kubelet Volume Manager" May 16 00:51:16.545505 kubelet[1617]: E0516 00:51:16.539617 1617 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.127:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.127:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fdba3b0ab0d6f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-16 00:51:16.533194095 +0000 UTC m=+0.654871749,LastTimestamp:2025-05-16 00:51:16.533194095 +0000 UTC m=+0.654871749,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 16 00:51:16.545887 kubelet[1617]: I0516 00:51:16.545873 1617 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 16 00:51:16.546006 kubelet[1617]: I0516 00:51:16.545996 1617 reconciler.go:26] "Reconciler: start to sync state" May 16 00:51:16.541000 audit[1630]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.541000 audit[1630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffda9ce710 a2=0 a3=1 items=0 ppid=1617 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 16 00:51:16.542000 audit[1631]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.542000 audit[1631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7d73f30 a2=0 a3=1 items=0 ppid=1617 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.542000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 16 00:51:16.545000 audit[1633]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.545000 audit[1633]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe3923820 a2=0 a3=1 items=0 ppid=1617 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.545000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:51:16.547088 kubelet[1617]: E0516 00:51:16.547067 1617 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 16 00:51:16.547379 kubelet[1617]: W0516 00:51:16.547054 1617 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.127:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 16 00:51:16.547494 kubelet[1617]: E0516 00:51:16.547479 1617 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.127:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.127:6443: connect: connection refused" logger="UnhandledError" May 16 00:51:16.547553 kubelet[1617]: I0516 00:51:16.547074 1617 factory.go:221] Registration of the systemd container factory successfully May 16 00:51:16.547680 kubelet[1617]: E0516 00:51:16.547281 1617 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:51:16.547754 kubelet[1617]: I0516 00:51:16.547739 1617 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 16 00:51:16.548169 kubelet[1617]: E0516 00:51:16.548128 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.127:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.127:6443: connect: connection refused" interval="200ms" May 16 00:51:16.548674 kubelet[1617]: I0516 00:51:16.548658 1617 factory.go:221] Registration of the containerd container factory successfully May 16 00:51:16.548000 audit[1635]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.548000 audit[1635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe2e47550 a2=0 a3=1 items=0 ppid=1617 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:51:16.555000 audit[1640]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1640 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.555000 audit[1640]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffc4693750 a2=0 a3=1 items=0 ppid=1617 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.555000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 16 00:51:16.556676 kubelet[1617]: I0516 00:51:16.556504 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 16 00:51:16.556000 audit[1642]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:16.556000 audit[1642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff3201e00 a2=0 a3=1 items=0 ppid=1617 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 16 00:51:16.556000 audit[1643]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.556000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4678d20 a2=0 a3=1 items=0 ppid=1617 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.556000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 16 00:51:16.557551 kubelet[1617]: I0516 00:51:16.557469 1617 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 16 00:51:16.557551 kubelet[1617]: I0516 00:51:16.557483 1617 status_manager.go:217] "Starting to sync pod status with apiserver" May 16 00:51:16.557551 kubelet[1617]: I0516 00:51:16.557498 1617 kubelet.go:2321] "Starting kubelet main sync loop" May 16 00:51:16.557551 kubelet[1617]: E0516 00:51:16.557535 1617 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 16 00:51:16.557000 audit[1644]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.557000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8596c20 a2=0 a3=1 items=0 ppid=1617 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.557000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 16 00:51:16.557000 audit[1645]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:16.557000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0072b30 a2=0 a3=1 items=0 ppid=1617 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.557000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 16 00:51:16.558000 audit[1646]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:16.558000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce37a330 a2=0 a3=1 items=0 ppid=1617 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.558000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 16 00:51:16.558000 audit[1647]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:16.558000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffdd683900 a2=0 a3=1 items=0 ppid=1617 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 16 00:51:16.560783 kubelet[1617]: W0516 00:51:16.560737 1617 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.127:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 16 00:51:16.560844 kubelet[1617]: E0516 00:51:16.560785 1617 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.127:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.127:6443: connect: connection refused" logger="UnhandledError" May 16 00:51:16.560903 kubelet[1617]: I0516 00:51:16.560877 1617 cpu_manager.go:214] "Starting CPU manager" policy="none" May 16 00:51:16.560903 kubelet[1617]: I0516 00:51:16.560887 1617 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 16 00:51:16.560903 kubelet[1617]: I0516 00:51:16.560902 1617 state_mem.go:36] "Initialized new in-memory state store" May 16 00:51:16.560000 audit[1648]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1648 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:16.560000 audit[1648]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffd5c55d0 a2=0 a3=1 items=0 ppid=1617 pid=1648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 16 00:51:16.623974 kubelet[1617]: I0516 00:51:16.623944 1617 policy_none.go:49] "None policy: Start" May 16 00:51:16.624676 kubelet[1617]: I0516 00:51:16.624646 1617 memory_manager.go:170] "Starting memorymanager" policy="None" May 16 00:51:16.624791 kubelet[1617]: I0516 00:51:16.624781 1617 state_mem.go:35] "Initializing new in-memory state store" May 16 00:51:16.631909 systemd[1]: Created slice kubepods.slice. May 16 00:51:16.635628 systemd[1]: Created slice kubepods-burstable.slice. May 16 00:51:16.637799 systemd[1]: Created slice kubepods-besteffort.slice. May 16 00:51:16.648317 kubelet[1617]: E0516 00:51:16.648292 1617 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:51:16.648467 kubelet[1617]: I0516 00:51:16.648446 1617 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 16 00:51:16.647000 audit[1617]: AVC avc: denied { mac_admin } for pid=1617 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:16.647000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:51:16.647000 audit[1617]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f0c9f0 a1=4000d139f8 a2=4000f0c9c0 a3=25 items=0 ppid=1 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:16.647000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:51:16.648661 kubelet[1617]: I0516 00:51:16.648522 1617 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 16 00:51:16.648661 kubelet[1617]: I0516 00:51:16.648619 1617 eviction_manager.go:189] "Eviction manager: starting control loop" May 16 00:51:16.648765 kubelet[1617]: I0516 00:51:16.648629 1617 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 16 00:51:16.649113 kubelet[1617]: I0516 00:51:16.648974 1617 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 16 00:51:16.649733 kubelet[1617]: E0516 00:51:16.649711 1617 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 16 00:51:16.664020 systemd[1]: Created slice kubepods-burstable-pod1be755f37f12b6288c780219b50bcbdf.slice. May 16 00:51:16.676644 systemd[1]: Created slice kubepods-burstable-poda3416600bab1918b24583836301c9096.slice. May 16 00:51:16.689492 systemd[1]: Created slice kubepods-burstable-podea5884ad3481d5218ff4c8f11f2934d5.slice. May 16 00:51:16.750699 kubelet[1617]: E0516 00:51:16.749840 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.127:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.127:6443: connect: connection refused" interval="400ms" May 16 00:51:16.750699 kubelet[1617]: I0516 00:51:16.750116 1617 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 16 00:51:16.750699 kubelet[1617]: E0516 00:51:16.750633 1617 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.127:6443/api/v1/nodes\": dial tcp 10.0.0.127:6443: connect: connection refused" node="localhost" May 16 00:51:16.846975 kubelet[1617]: I0516 00:51:16.846946 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:16.847139 kubelet[1617]: I0516 00:51:16.847121 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:16.847244 kubelet[1617]: I0516 00:51:16.847222 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ea5884ad3481d5218ff4c8f11f2934d5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"ea5884ad3481d5218ff4c8f11f2934d5\") " pod="kube-system/kube-scheduler-localhost" May 16 00:51:16.847347 kubelet[1617]: I0516 00:51:16.847335 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1be755f37f12b6288c780219b50bcbdf-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1be755f37f12b6288c780219b50bcbdf\") " pod="kube-system/kube-apiserver-localhost" May 16 00:51:16.847437 kubelet[1617]: I0516 00:51:16.847424 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:16.847510 kubelet[1617]: I0516 00:51:16.847498 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:16.847581 kubelet[1617]: I0516 00:51:16.847570 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:16.847667 kubelet[1617]: I0516 00:51:16.847656 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1be755f37f12b6288c780219b50bcbdf-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1be755f37f12b6288c780219b50bcbdf\") " pod="kube-system/kube-apiserver-localhost" May 16 00:51:16.847763 kubelet[1617]: I0516 00:51:16.847751 1617 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1be755f37f12b6288c780219b50bcbdf-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1be755f37f12b6288c780219b50bcbdf\") " pod="kube-system/kube-apiserver-localhost" May 16 00:51:16.952221 kubelet[1617]: I0516 00:51:16.952190 1617 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 16 00:51:16.952571 kubelet[1617]: E0516 00:51:16.952549 1617 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.127:6443/api/v1/nodes\": dial tcp 10.0.0.127:6443: connect: connection refused" node="localhost" May 16 00:51:16.975831 kubelet[1617]: E0516 00:51:16.975801 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:16.976567 env[1213]: time="2025-05-16T00:51:16.976320634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1be755f37f12b6288c780219b50bcbdf,Namespace:kube-system,Attempt:0,}" May 16 00:51:16.988567 kubelet[1617]: E0516 00:51:16.988537 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:16.988872 env[1213]: time="2025-05-16T00:51:16.988831252Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:a3416600bab1918b24583836301c9096,Namespace:kube-system,Attempt:0,}" May 16 00:51:16.991328 kubelet[1617]: E0516 00:51:16.991311 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:16.991739 env[1213]: time="2025-05-16T00:51:16.991641278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:ea5884ad3481d5218ff4c8f11f2934d5,Namespace:kube-system,Attempt:0,}" May 16 00:51:17.150506 kubelet[1617]: E0516 00:51:17.150453 1617 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.127:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.127:6443: connect: connection refused" interval="800ms" May 16 00:51:17.354197 kubelet[1617]: I0516 00:51:17.354168 1617 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 16 00:51:17.354456 kubelet[1617]: E0516 00:51:17.354435 1617 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.127:6443/api/v1/nodes\": dial tcp 10.0.0.127:6443: connect: connection refused" node="localhost" May 16 00:51:17.409843 kubelet[1617]: W0516 00:51:17.409761 1617 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.127:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 16 00:51:17.409843 kubelet[1617]: E0516 00:51:17.409814 1617 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.127:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.127:6443: connect: connection refused" logger="UnhandledError" May 16 00:51:17.489834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1995765030.mount: Deactivated successfully. May 16 00:51:17.495249 env[1213]: time="2025-05-16T00:51:17.495212401Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.496111 env[1213]: time="2025-05-16T00:51:17.496087591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.497097 env[1213]: time="2025-05-16T00:51:17.497073209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.498258 env[1213]: time="2025-05-16T00:51:17.498218069Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.499737 env[1213]: time="2025-05-16T00:51:17.499713341Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.501973 env[1213]: time="2025-05-16T00:51:17.501949567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.504839 env[1213]: time="2025-05-16T00:51:17.504813198Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.505574 env[1213]: time="2025-05-16T00:51:17.505545030Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.508462 env[1213]: time="2025-05-16T00:51:17.508438748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.509388 env[1213]: time="2025-05-16T00:51:17.509365071Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.510480 env[1213]: time="2025-05-16T00:51:17.510397382Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.511219 env[1213]: time="2025-05-16T00:51:17.511194230Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:17.540910 env[1213]: time="2025-05-16T00:51:17.540843563Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:17.541047 env[1213]: time="2025-05-16T00:51:17.540894336Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:17.541047 env[1213]: time="2025-05-16T00:51:17.540919262Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:17.541195 env[1213]: time="2025-05-16T00:51:17.540950591Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:17.541195 env[1213]: time="2025-05-16T00:51:17.540981039Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:17.541195 env[1213]: time="2025-05-16T00:51:17.540990521Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:17.541358 env[1213]: time="2025-05-16T00:51:17.541307004Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:17.541436 env[1213]: time="2025-05-16T00:51:17.541349855Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:17.541436 env[1213]: time="2025-05-16T00:51:17.541359938Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:17.541512 env[1213]: time="2025-05-16T00:51:17.541483770Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db646b2c9cf7b00f4354e8e13beae38d60f1c0cb107a294d6473b3b81c441485 pid=1675 runtime=io.containerd.runc.v2 May 16 00:51:17.541632 env[1213]: time="2025-05-16T00:51:17.541600281Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2f263561d0a3487df566812a9d88c2165e0019f6b123ebaa06b32328daf6b10 pid=1671 runtime=io.containerd.runc.v2 May 16 00:51:17.541693 env[1213]: time="2025-05-16T00:51:17.541609883Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ee02671f2ab83f7200a59c428eeeeba5f2c1d9bb51ae9c3b8a5c40a75dbd49e pid=1674 runtime=io.containerd.runc.v2 May 16 00:51:17.554483 systemd[1]: Started cri-containerd-5ee02671f2ab83f7200a59c428eeeeba5f2c1d9bb51ae9c3b8a5c40a75dbd49e.scope. May 16 00:51:17.555381 systemd[1]: Started cri-containerd-a2f263561d0a3487df566812a9d88c2165e0019f6b123ebaa06b32328daf6b10.scope. May 16 00:51:17.560733 systemd[1]: Started cri-containerd-db646b2c9cf7b00f4354e8e13beae38d60f1c0cb107a294d6473b3b81c441485.scope. May 16 00:51:17.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.593000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.594000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.594000 audit: BPF prog-id=58 op=LOAD May 16 00:51:17.595000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1671 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663236333536316430613334383764663536363831326139643838 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1671 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663236333536316430613334383764663536363831326139643838 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.595000 audit: BPF prog-id=59 op=LOAD May 16 00:51:17.595000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1671 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.595000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663236333536316430613334383764663536363831326139643838 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.596000 audit: BPF prog-id=60 op=LOAD May 16 00:51:17.596000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1671 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663236333536316430613334383764663536363831326139643838 May 16 00:51:17.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.597000 audit: BPF prog-id=61 op=LOAD May 16 00:51:17.598000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363436623263396366376230306634333534653865313362656165 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363436623263396366376230306634333534653865313362656165 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.598000 audit: BPF prog-id=62 op=LOAD May 16 00:51:17.598000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363436623263396366376230306634333534653865313362656165 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.599000 audit: BPF prog-id=63 op=LOAD May 16 00:51:17.599000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.599000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363436623263396366376230306634333534653865313362656165 May 16 00:51:17.601000 audit: BPF prog-id=60 op=UNLOAD May 16 00:51:17.601000 audit: BPF prog-id=63 op=UNLOAD May 16 00:51:17.601000 audit: BPF prog-id=59 op=UNLOAD May 16 00:51:17.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit: BPF prog-id=62 op=UNLOAD May 16 00:51:17.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { perfmon } for pid=1703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { perfmon } for pid=1702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit: BPF prog-id=64 op=LOAD May 16 00:51:17.601000 audit[1703]: AVC avc: denied { bpf } for pid=1703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit: BPF prog-id=65 op=LOAD May 16 00:51:17.601000 audit[1703]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1671 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132663236333536316430613334383764663536363831326139643838 May 16 00:51:17.601000 audit[1702]: AVC avc: denied { bpf } for pid=1702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit: BPF prog-id=66 op=LOAD May 16 00:51:17.601000 audit[1702]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1675 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462363436623263396366376230306634333534653865313362656165 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019db38 a2=10 a3=0 items=0 ppid=1674 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653032363731663261623833663732303061353963343238656565 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019d5a0 a2=3c a3=0 items=0 ppid=1674 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653032363731663261623833663732303061353963343238656565 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit: BPF prog-id=67 op=LOAD May 16 00:51:17.601000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019d8e0 a2=78 a3=0 items=0 ppid=1674 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653032363731663261623833663732303061353963343238656565 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit: BPF prog-id=68 op=LOAD May 16 00:51:17.601000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019d670 a2=78 a3=0 items=0 ppid=1674 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653032363731663261623833663732303061353963343238656565 May 16 00:51:17.601000 audit: BPF prog-id=68 op=UNLOAD May 16 00:51:17.601000 audit: BPF prog-id=67 op=UNLOAD May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { perfmon } for pid=1705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit[1705]: AVC avc: denied { bpf } for pid=1705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.601000 audit: BPF prog-id=69 op=LOAD May 16 00:51:17.601000 audit[1705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019db40 a2=78 a3=0 items=0 ppid=1674 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565653032363731663261623833663732303061353963343238656565 May 16 00:51:17.625625 kubelet[1617]: W0516 00:51:17.625532 1617 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.127:6443: connect: connection refused May 16 00:51:17.625625 kubelet[1617]: E0516 00:51:17.625595 1617 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.127:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.127:6443: connect: connection refused" logger="UnhandledError" May 16 00:51:17.627582 env[1213]: time="2025-05-16T00:51:17.627542929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:a3416600bab1918b24583836301c9096,Namespace:kube-system,Attempt:0,} returns sandbox id \"db646b2c9cf7b00f4354e8e13beae38d60f1c0cb107a294d6473b3b81c441485\"" May 16 00:51:17.628651 env[1213]: time="2025-05-16T00:51:17.627836886Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:1be755f37f12b6288c780219b50bcbdf,Namespace:kube-system,Attempt:0,} returns sandbox id \"a2f263561d0a3487df566812a9d88c2165e0019f6b123ebaa06b32328daf6b10\"" May 16 00:51:17.629044 env[1213]: time="2025-05-16T00:51:17.627962559Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:ea5884ad3481d5218ff4c8f11f2934d5,Namespace:kube-system,Attempt:0,} returns sandbox id \"5ee02671f2ab83f7200a59c428eeeeba5f2c1d9bb51ae9c3b8a5c40a75dbd49e\"" May 16 00:51:17.629667 kubelet[1617]: E0516 00:51:17.629481 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:17.631111 kubelet[1617]: E0516 00:51:17.629896 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:17.631171 env[1213]: time="2025-05-16T00:51:17.631061171Z" level=info msg="CreateContainer within sandbox \"db646b2c9cf7b00f4354e8e13beae38d60f1c0cb107a294d6473b3b81c441485\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 16 00:51:17.631220 env[1213]: time="2025-05-16T00:51:17.631192046Z" level=info msg="CreateContainer within sandbox \"a2f263561d0a3487df566812a9d88c2165e0019f6b123ebaa06b32328daf6b10\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 16 00:51:17.631773 kubelet[1617]: E0516 00:51:17.631651 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:17.633190 env[1213]: time="2025-05-16T00:51:17.633166523Z" level=info msg="CreateContainer within sandbox \"5ee02671f2ab83f7200a59c428eeeeba5f2c1d9bb51ae9c3b8a5c40a75dbd49e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 16 00:51:17.649227 env[1213]: time="2025-05-16T00:51:17.649192524Z" level=info msg="CreateContainer within sandbox \"db646b2c9cf7b00f4354e8e13beae38d60f1c0cb107a294d6473b3b81c441485\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b5066f676549acff6654e911b75e5955b0f1678e76e700b16d461fd83caae45f\"" May 16 00:51:17.649745 env[1213]: time="2025-05-16T00:51:17.649694976Z" level=info msg="StartContainer for \"b5066f676549acff6654e911b75e5955b0f1678e76e700b16d461fd83caae45f\"" May 16 00:51:17.652284 env[1213]: time="2025-05-16T00:51:17.652254007Z" level=info msg="CreateContainer within sandbox \"a2f263561d0a3487df566812a9d88c2165e0019f6b123ebaa06b32328daf6b10\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"292c1d25a41c45d384de4ee5d33b5eebb954edd4f80d629d8079a1e1009c3d7c\"" May 16 00:51:17.652778 env[1213]: time="2025-05-16T00:51:17.652752137Z" level=info msg="StartContainer for \"292c1d25a41c45d384de4ee5d33b5eebb954edd4f80d629d8079a1e1009c3d7c\"" May 16 00:51:17.653398 env[1213]: time="2025-05-16T00:51:17.653367859Z" level=info msg="CreateContainer within sandbox \"5ee02671f2ab83f7200a59c428eeeeba5f2c1d9bb51ae9c3b8a5c40a75dbd49e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"895ecf4ab96bf601b49819c1480eccc5e236f9e14137fb687cf22b8dad967b38\"" May 16 00:51:17.653697 env[1213]: time="2025-05-16T00:51:17.653677380Z" level=info msg="StartContainer for \"895ecf4ab96bf601b49819c1480eccc5e236f9e14137fb687cf22b8dad967b38\"" May 16 00:51:17.666227 systemd[1]: Started cri-containerd-b5066f676549acff6654e911b75e5955b0f1678e76e700b16d461fd83caae45f.scope. May 16 00:51:17.679831 systemd[1]: Started cri-containerd-895ecf4ab96bf601b49819c1480eccc5e236f9e14137fb687cf22b8dad967b38.scope. May 16 00:51:17.693834 systemd[1]: Started cri-containerd-292c1d25a41c45d384de4ee5d33b5eebb954edd4f80d629d8079a1e1009c3d7c.scope. May 16 00:51:17.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.707000 audit: BPF prog-id=70 op=LOAD May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1674 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356563663461623936626636303162343938313963313438306563 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1674 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356563663461623936626636303162343938313963313438306563 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit: BPF prog-id=71 op=LOAD May 16 00:51:17.708000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1674 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356563663461623936626636303162343938313963313438306563 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit: BPF prog-id=72 op=LOAD May 16 00:51:17.708000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1674 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356563663461623936626636303162343938313963313438306563 May 16 00:51:17.708000 audit: BPF prog-id=72 op=UNLOAD May 16 00:51:17.708000 audit: BPF prog-id=71 op=UNLOAD May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { perfmon } for pid=1809 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit[1809]: AVC avc: denied { bpf } for pid=1809 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.708000 audit: BPF prog-id=73 op=LOAD May 16 00:51:17.708000 audit[1809]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1674 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.708000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839356563663461623936626636303162343938313963313438306563 May 16 00:51:17.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit: BPF prog-id=74 op=LOAD May 16 00:51:17.714000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.714000 audit[1808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1671 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326331643235613431633435643338346465346565356433336235 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1671 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326331643235613431633435643338346465346565356433336235 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.715000 audit: BPF prog-id=75 op=LOAD May 16 00:51:17.715000 audit[1808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1671 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326331643235613431633435643338346465346565356433336235 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit: BPF prog-id=76 op=LOAD May 16 00:51:17.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.716000 audit: BPF prog-id=77 op=LOAD May 16 00:51:17.716000 audit[1808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1671 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.717000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303636663637363534396163666636363534653931316237356535 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303636663637363534396163666636363534653931316237356535 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.717000 audit: BPF prog-id=78 op=LOAD May 16 00:51:17.717000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303636663637363534396163666636363534653931316237356535 May 16 00:51:17.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326331643235613431633435643338346465346565356433336235 May 16 00:51:17.718000 audit: BPF prog-id=76 op=UNLOAD May 16 00:51:17.718000 audit: BPF prog-id=75 op=UNLOAD May 16 00:51:17.718000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { perfmon } for pid=1808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1808]: AVC avc: denied { bpf } for pid=1808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit: BPF prog-id=79 op=LOAD May 16 00:51:17.718000 audit[1808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1671 pid=1808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326331643235613431633435643338346465346565356433336235 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.718000 audit: BPF prog-id=80 op=LOAD May 16 00:51:17.718000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303636663637363534396163666636363534653931316237356535 May 16 00:51:17.718000 audit: BPF prog-id=80 op=UNLOAD May 16 00:51:17.719000 audit: BPF prog-id=78 op=UNLOAD May 16 00:51:17.719000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { perfmon } for pid=1791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit[1791]: AVC avc: denied { bpf } for pid=1791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:17.719000 audit: BPF prog-id=81 op=LOAD May 16 00:51:17.719000 audit[1791]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1675 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:17.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235303636663637363534396163666636363534653931316237356535 May 16 00:51:17.737610 env[1213]: time="2025-05-16T00:51:17.737564930Z" level=info msg="StartContainer for \"292c1d25a41c45d384de4ee5d33b5eebb954edd4f80d629d8079a1e1009c3d7c\" returns successfully" May 16 00:51:17.738070 env[1213]: time="2025-05-16T00:51:17.738040854Z" level=info msg="StartContainer for \"895ecf4ab96bf601b49819c1480eccc5e236f9e14137fb687cf22b8dad967b38\" returns successfully" May 16 00:51:17.765908 env[1213]: time="2025-05-16T00:51:17.765842582Z" level=info msg="StartContainer for \"b5066f676549acff6654e911b75e5955b0f1678e76e700b16d461fd83caae45f\" returns successfully" May 16 00:51:18.156153 kubelet[1617]: I0516 00:51:18.156101 1617 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 16 00:51:18.584833 kubelet[1617]: E0516 00:51:18.584806 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:18.585678 kubelet[1617]: E0516 00:51:18.585656 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:18.586997 kubelet[1617]: E0516 00:51:18.586978 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:19.533000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.533000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40051c5b40 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:51:19.533000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.533000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006fd5350 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:51:19.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:51:19.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:51:19.534000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.534000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4001131860 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:51:19.534000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:51:19.547000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.547000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=400506c8a0 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:51:19.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:51:19.547000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.547000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=4000e29f80 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:51:19.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:51:19.547000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.547000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=4006626120 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:51:19.547000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:51:19.591386 kubelet[1617]: E0516 00:51:19.591359 1617 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:19.622000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.622000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40001e7fb0 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:51:19.622000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:51:19.622000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:19.622000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400049f500 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:51:19.622000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:51:19.627106 kubelet[1617]: E0516 00:51:19.627074 1617 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 16 00:51:19.776502 kubelet[1617]: I0516 00:51:19.776468 1617 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 16 00:51:19.776502 kubelet[1617]: E0516 00:51:19.776501 1617 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 16 00:51:20.533061 kubelet[1617]: I0516 00:51:20.532982 1617 apiserver.go:52] "Watching apiserver" May 16 00:51:20.546934 kubelet[1617]: I0516 00:51:20.546847 1617 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 16 00:51:21.841420 systemd[1]: Reloading. May 16 00:51:21.891435 /usr/lib/systemd/system-generators/torcx-generator[1914]: time="2025-05-16T00:51:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:51:21.891463 /usr/lib/systemd/system-generators/torcx-generator[1914]: time="2025-05-16T00:51:21Z" level=info msg="torcx already run" May 16 00:51:21.947588 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:51:21.947607 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:51:21.963001 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:51:22.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.026204 kernel: kauditd_printk_skb: 585 callbacks suppressed May 16 00:51:22.026251 kernel: audit: type=1400 audit(1747356682.024:558): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.029523 kernel: audit: type=1400 audit(1747356682.025:559): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.029584 kernel: audit: type=1400 audit(1747356682.025:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.031206 kernel: audit: type=1400 audit(1747356682.025:561): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.035164 kernel: audit: type=1400 audit(1747356682.025:562): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.035244 kernel: audit: type=1400 audit(1747356682.025:563): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.038841 kernel: audit: type=1400 audit(1747356682.025:564): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.038888 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 16 00:51:22.038908 kernel: audit: type=1400 audit(1747356682.025:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041064 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 16 00:51:22.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.027000 audit: BPF prog-id=82 op=LOAD May 16 00:51:22.027000 audit: BPF prog-id=43 op=UNLOAD May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit: BPF prog-id=83 op=LOAD May 16 00:51:22.028000 audit: BPF prog-id=44 op=UNLOAD May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit: BPF prog-id=84 op=LOAD May 16 00:51:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit: BPF prog-id=85 op=LOAD May 16 00:51:22.032000 audit: BPF prog-id=45 op=UNLOAD May 16 00:51:22.032000 audit: BPF prog-id=46 op=UNLOAD May 16 00:51:22.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit: BPF prog-id=86 op=LOAD May 16 00:51:22.034000 audit: BPF prog-id=77 op=UNLOAD May 16 00:51:22.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.036000 audit: BPF prog-id=87 op=LOAD May 16 00:51:22.036000 audit: BPF prog-id=47 op=UNLOAD May 16 00:51:22.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.040000 audit: BPF prog-id=88 op=LOAD May 16 00:51:22.040000 audit: BPF prog-id=48 op=UNLOAD May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit: BPF prog-id=89 op=LOAD May 16 00:51:22.041000 audit: BPF prog-id=61 op=UNLOAD May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit: BPF prog-id=90 op=LOAD May 16 00:51:22.041000 audit: BPF prog-id=49 op=UNLOAD May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit: BPF prog-id=91 op=LOAD May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.041000 audit: BPF prog-id=92 op=LOAD May 16 00:51:22.041000 audit: BPF prog-id=50 op=UNLOAD May 16 00:51:22.041000 audit: BPF prog-id=51 op=UNLOAD May 16 00:51:22.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.042000 audit: BPF prog-id=93 op=LOAD May 16 00:51:22.042000 audit: BPF prog-id=58 op=UNLOAD May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit: BPF prog-id=94 op=LOAD May 16 00:51:22.043000 audit: BPF prog-id=52 op=UNLOAD May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit: BPF prog-id=95 op=LOAD May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.043000 audit: BPF prog-id=96 op=LOAD May 16 00:51:22.043000 audit: BPF prog-id=53 op=UNLOAD May 16 00:51:22.043000 audit: BPF prog-id=54 op=UNLOAD May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit: BPF prog-id=97 op=LOAD May 16 00:51:22.044000 audit: BPF prog-id=74 op=UNLOAD May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.044000 audit: BPF prog-id=98 op=LOAD May 16 00:51:22.044000 audit: BPF prog-id=70 op=UNLOAD May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit: BPF prog-id=99 op=LOAD May 16 00:51:22.045000 audit: BPF prog-id=64 op=UNLOAD May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit: BPF prog-id=100 op=LOAD May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.045000 audit: BPF prog-id=101 op=LOAD May 16 00:51:22.045000 audit: BPF prog-id=55 op=UNLOAD May 16 00:51:22.045000 audit: BPF prog-id=56 op=UNLOAD May 16 00:51:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.046000 audit: BPF prog-id=102 op=LOAD May 16 00:51:22.046000 audit: BPF prog-id=57 op=UNLOAD May 16 00:51:22.057283 systemd[1]: Stopping kubelet.service... May 16 00:51:22.083258 systemd[1]: kubelet.service: Deactivated successfully. May 16 00:51:22.083465 systemd[1]: Stopped kubelet.service. May 16 00:51:22.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:22.083522 systemd[1]: kubelet.service: Consumed 1.027s CPU time. May 16 00:51:22.085620 systemd[1]: Starting kubelet.service... May 16 00:51:22.177481 systemd[1]: Started kubelet.service. May 16 00:51:22.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:22.218266 kubelet[1956]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:51:22.218566 kubelet[1956]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 16 00:51:22.218612 kubelet[1956]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:51:22.218741 kubelet[1956]: I0516 00:51:22.218713 1956 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 16 00:51:22.224394 kubelet[1956]: I0516 00:51:22.224360 1956 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 16 00:51:22.224394 kubelet[1956]: I0516 00:51:22.224387 1956 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 16 00:51:22.224616 kubelet[1956]: I0516 00:51:22.224588 1956 server.go:934] "Client rotation is on, will bootstrap in background" May 16 00:51:22.226530 kubelet[1956]: I0516 00:51:22.226500 1956 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 16 00:51:22.228891 kubelet[1956]: I0516 00:51:22.228847 1956 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 16 00:51:22.232960 kubelet[1956]: E0516 00:51:22.232937 1956 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 16 00:51:22.233107 kubelet[1956]: I0516 00:51:22.233094 1956 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 16 00:51:22.236198 kubelet[1956]: I0516 00:51:22.236173 1956 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 16 00:51:22.236332 kubelet[1956]: I0516 00:51:22.236306 1956 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 16 00:51:22.236460 kubelet[1956]: I0516 00:51:22.236439 1956 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 16 00:51:22.236734 kubelet[1956]: I0516 00:51:22.236463 1956 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 16 00:51:22.236734 kubelet[1956]: I0516 00:51:22.236660 1956 topology_manager.go:138] "Creating topology manager with none policy" May 16 00:51:22.236734 kubelet[1956]: I0516 00:51:22.236670 1956 container_manager_linux.go:300] "Creating device plugin manager" May 16 00:51:22.236734 kubelet[1956]: I0516 00:51:22.236716 1956 state_mem.go:36] "Initialized new in-memory state store" May 16 00:51:22.236910 kubelet[1956]: I0516 00:51:22.236847 1956 kubelet.go:408] "Attempting to sync node with API server" May 16 00:51:22.236910 kubelet[1956]: I0516 00:51:22.236876 1956 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 16 00:51:22.236910 kubelet[1956]: I0516 00:51:22.236894 1956 kubelet.go:314] "Adding apiserver pod source" May 16 00:51:22.236910 kubelet[1956]: I0516 00:51:22.236909 1956 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 16 00:51:22.237467 kubelet[1956]: I0516 00:51:22.237450 1956 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 16 00:51:22.242456 kubelet[1956]: I0516 00:51:22.242440 1956 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 16 00:51:22.243038 kubelet[1956]: I0516 00:51:22.243022 1956 server.go:1274] "Started kubelet" May 16 00:51:22.243193 kubelet[1956]: I0516 00:51:22.243170 1956 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 16 00:51:22.244353 kubelet[1956]: I0516 00:51:22.244333 1956 server.go:449] "Adding debug handlers to kubelet server" May 16 00:51:22.243000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.243000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:51:22.243000 audit[1956]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006b9260 a1=40005e5548 a2=40006b9230 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:22.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:51:22.243000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.243000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:51:22.243000 audit[1956]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006b6900 a1=40005e5560 a2=40006b92f0 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:22.243000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:51:22.244886 kubelet[1956]: I0516 00:51:22.244603 1956 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 16 00:51:22.244886 kubelet[1956]: I0516 00:51:22.244645 1956 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 16 00:51:22.244886 kubelet[1956]: I0516 00:51:22.244677 1956 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 16 00:51:22.246350 kubelet[1956]: I0516 00:51:22.246308 1956 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 16 00:51:22.246598 kubelet[1956]: I0516 00:51:22.246579 1956 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 16 00:51:22.251313 kubelet[1956]: I0516 00:51:22.251290 1956 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 16 00:51:22.259127 kubelet[1956]: I0516 00:51:22.259101 1956 volume_manager.go:289] "Starting Kubelet Volume Manager" May 16 00:51:22.261375 kubelet[1956]: I0516 00:51:22.261360 1956 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 16 00:51:22.264170 kubelet[1956]: I0516 00:51:22.264140 1956 reconciler.go:26] "Reconciler: start to sync state" May 16 00:51:22.264429 kubelet[1956]: I0516 00:51:22.264412 1956 factory.go:221] Registration of the systemd container factory successfully May 16 00:51:22.264529 kubelet[1956]: I0516 00:51:22.264505 1956 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 16 00:51:22.265868 kubelet[1956]: I0516 00:51:22.265736 1956 factory.go:221] Registration of the containerd container factory successfully May 16 00:51:22.266013 kubelet[1956]: E0516 00:51:22.265995 1956 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 16 00:51:22.272721 kubelet[1956]: I0516 00:51:22.272678 1956 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 16 00:51:22.274947 kubelet[1956]: I0516 00:51:22.274922 1956 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 16 00:51:22.276411 kubelet[1956]: I0516 00:51:22.276394 1956 status_manager.go:217] "Starting to sync pod status with apiserver" May 16 00:51:22.276625 kubelet[1956]: I0516 00:51:22.276615 1956 kubelet.go:2321] "Starting kubelet main sync loop" May 16 00:51:22.276762 kubelet[1956]: E0516 00:51:22.276741 1956 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 16 00:51:22.311907 kubelet[1956]: I0516 00:51:22.311883 1956 cpu_manager.go:214] "Starting CPU manager" policy="none" May 16 00:51:22.312037 kubelet[1956]: I0516 00:51:22.312024 1956 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 16 00:51:22.312119 kubelet[1956]: I0516 00:51:22.312109 1956 state_mem.go:36] "Initialized new in-memory state store" May 16 00:51:22.312301 kubelet[1956]: I0516 00:51:22.312287 1956 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 16 00:51:22.312377 kubelet[1956]: I0516 00:51:22.312351 1956 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 16 00:51:22.312429 kubelet[1956]: I0516 00:51:22.312420 1956 policy_none.go:49] "None policy: Start" May 16 00:51:22.313075 kubelet[1956]: I0516 00:51:22.313059 1956 memory_manager.go:170] "Starting memorymanager" policy="None" May 16 00:51:22.313159 kubelet[1956]: I0516 00:51:22.313149 1956 state_mem.go:35] "Initializing new in-memory state store" May 16 00:51:22.313337 kubelet[1956]: I0516 00:51:22.313324 1956 state_mem.go:75] "Updated machine memory state" May 16 00:51:22.317015 kubelet[1956]: I0516 00:51:22.316983 1956 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 16 00:51:22.316000 audit[1956]: AVC avc: denied { mac_admin } for pid=1956 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:22.316000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:51:22.316000 audit[1956]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40006b8fc0 a1=40011aacd8 a2=40006b8f90 a3=25 items=0 ppid=1 pid=1956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:22.316000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:51:22.317245 kubelet[1956]: I0516 00:51:22.317040 1956 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 16 00:51:22.317245 kubelet[1956]: I0516 00:51:22.317161 1956 eviction_manager.go:189] "Eviction manager: starting control loop" May 16 00:51:22.318168 kubelet[1956]: I0516 00:51:22.317175 1956 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 16 00:51:22.318363 kubelet[1956]: I0516 00:51:22.318345 1956 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 16 00:51:22.426947 kubelet[1956]: I0516 00:51:22.426913 1956 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 16 00:51:22.432474 kubelet[1956]: I0516 00:51:22.432379 1956 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 16 00:51:22.432474 kubelet[1956]: I0516 00:51:22.432455 1956 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 16 00:51:22.465305 kubelet[1956]: I0516 00:51:22.465274 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:22.465398 kubelet[1956]: I0516 00:51:22.465344 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:22.465398 kubelet[1956]: I0516 00:51:22.465367 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:22.465398 kubelet[1956]: I0516 00:51:22.465385 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1be755f37f12b6288c780219b50bcbdf-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"1be755f37f12b6288c780219b50bcbdf\") " pod="kube-system/kube-apiserver-localhost" May 16 00:51:22.465491 kubelet[1956]: I0516 00:51:22.465421 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:22.465491 kubelet[1956]: I0516 00:51:22.465439 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:51:22.465491 kubelet[1956]: I0516 00:51:22.465454 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ea5884ad3481d5218ff4c8f11f2934d5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"ea5884ad3481d5218ff4c8f11f2934d5\") " pod="kube-system/kube-scheduler-localhost" May 16 00:51:22.465568 kubelet[1956]: I0516 00:51:22.465498 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1be755f37f12b6288c780219b50bcbdf-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"1be755f37f12b6288c780219b50bcbdf\") " pod="kube-system/kube-apiserver-localhost" May 16 00:51:22.465568 kubelet[1956]: I0516 00:51:22.465514 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1be755f37f12b6288c780219b50bcbdf-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"1be755f37f12b6288c780219b50bcbdf\") " pod="kube-system/kube-apiserver-localhost" May 16 00:51:22.689590 kubelet[1956]: E0516 00:51:22.689480 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:22.690574 kubelet[1956]: E0516 00:51:22.690542 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:22.690732 kubelet[1956]: E0516 00:51:22.690715 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:23.237482 kubelet[1956]: I0516 00:51:23.237442 1956 apiserver.go:52] "Watching apiserver" May 16 00:51:23.262152 kubelet[1956]: I0516 00:51:23.262119 1956 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 16 00:51:23.288553 kubelet[1956]: E0516 00:51:23.288131 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:23.288553 kubelet[1956]: E0516 00:51:23.288213 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:23.288553 kubelet[1956]: E0516 00:51:23.288406 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:23.305247 kubelet[1956]: I0516 00:51:23.305187 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.305163184 podStartE2EDuration="1.305163184s" podCreationTimestamp="2025-05-16 00:51:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:51:23.305017558 +0000 UTC m=+1.124140822" watchObservedRunningTime="2025-05-16 00:51:23.305163184 +0000 UTC m=+1.124286448" May 16 00:51:23.319868 kubelet[1956]: I0516 00:51:23.319799 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.319771024 podStartE2EDuration="1.319771024s" podCreationTimestamp="2025-05-16 00:51:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:51:23.312572622 +0000 UTC m=+1.131695966" watchObservedRunningTime="2025-05-16 00:51:23.319771024 +0000 UTC m=+1.138894288" May 16 00:51:23.320110 kubelet[1956]: I0516 00:51:23.320068 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.320061915 podStartE2EDuration="1.320061915s" podCreationTimestamp="2025-05-16 00:51:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:51:23.319178158 +0000 UTC m=+1.138301422" watchObservedRunningTime="2025-05-16 00:51:23.320061915 +0000 UTC m=+1.139185179" May 16 00:51:24.289180 kubelet[1956]: E0516 00:51:24.289143 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:24.430015 kubelet[1956]: E0516 00:51:24.429985 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:25.290339 kubelet[1956]: E0516 00:51:25.290306 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:25.451000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 16 00:51:25.451000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000873980 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:51:25.451000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:51:26.450000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:26.450000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000f01880 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:51:26.450000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:51:26.451000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:26.451000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40010290c0 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:51:26.451000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:51:26.451000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:26.451000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40003fa040 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:51:26.451000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:51:26.452000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:51:26.452000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001029280 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:51:26.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:51:28.463197 kubelet[1956]: I0516 00:51:28.463148 1956 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 16 00:51:28.463578 env[1213]: time="2025-05-16T00:51:28.463522668Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 16 00:51:28.463783 kubelet[1956]: I0516 00:51:28.463749 1956 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 16 00:51:29.323206 systemd[1]: Created slice kubepods-besteffort-pod1ba93f30_8020_4133_9efe_1fbc1cbb205f.slice. May 16 00:51:29.412270 kubelet[1956]: I0516 00:51:29.412227 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1ba93f30-8020-4133-9efe-1fbc1cbb205f-xtables-lock\") pod \"kube-proxy-84qzb\" (UID: \"1ba93f30-8020-4133-9efe-1fbc1cbb205f\") " pod="kube-system/kube-proxy-84qzb" May 16 00:51:29.412270 kubelet[1956]: I0516 00:51:29.412275 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1ba93f30-8020-4133-9efe-1fbc1cbb205f-lib-modules\") pod \"kube-proxy-84qzb\" (UID: \"1ba93f30-8020-4133-9efe-1fbc1cbb205f\") " pod="kube-system/kube-proxy-84qzb" May 16 00:51:29.412466 kubelet[1956]: I0516 00:51:29.412296 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1ba93f30-8020-4133-9efe-1fbc1cbb205f-kube-proxy\") pod \"kube-proxy-84qzb\" (UID: \"1ba93f30-8020-4133-9efe-1fbc1cbb205f\") " pod="kube-system/kube-proxy-84qzb" May 16 00:51:29.412466 kubelet[1956]: I0516 00:51:29.412313 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n8mnw\" (UniqueName: \"kubernetes.io/projected/1ba93f30-8020-4133-9efe-1fbc1cbb205f-kube-api-access-n8mnw\") pod \"kube-proxy-84qzb\" (UID: \"1ba93f30-8020-4133-9efe-1fbc1cbb205f\") " pod="kube-system/kube-proxy-84qzb" May 16 00:51:29.521175 kubelet[1956]: I0516 00:51:29.521139 1956 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 16 00:51:29.605746 systemd[1]: Created slice kubepods-besteffort-pod4d1f04d3_7699_418f_9951_71d917061f6a.slice. May 16 00:51:29.613573 kubelet[1956]: I0516 00:51:29.613490 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4d1f04d3-7699-418f-9951-71d917061f6a-var-lib-calico\") pod \"tigera-operator-7c5755cdcb-59zjr\" (UID: \"4d1f04d3-7699-418f-9951-71d917061f6a\") " pod="tigera-operator/tigera-operator-7c5755cdcb-59zjr" May 16 00:51:29.613573 kubelet[1956]: I0516 00:51:29.613544 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-llxpx\" (UniqueName: \"kubernetes.io/projected/4d1f04d3-7699-418f-9951-71d917061f6a-kube-api-access-llxpx\") pod \"tigera-operator-7c5755cdcb-59zjr\" (UID: \"4d1f04d3-7699-418f-9951-71d917061f6a\") " pod="tigera-operator/tigera-operator-7c5755cdcb-59zjr" May 16 00:51:29.635017 kubelet[1956]: E0516 00:51:29.634972 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:29.635873 env[1213]: time="2025-05-16T00:51:29.635812585Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-84qzb,Uid:1ba93f30-8020-4133-9efe-1fbc1cbb205f,Namespace:kube-system,Attempt:0,}" May 16 00:51:29.651429 env[1213]: time="2025-05-16T00:51:29.651253691Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:29.651429 env[1213]: time="2025-05-16T00:51:29.651296736Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:29.651429 env[1213]: time="2025-05-16T00:51:29.651308738Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:29.651601 env[1213]: time="2025-05-16T00:51:29.651508962Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cfe1401df4c53fee9084609e11895705780461c97a09c536b7f627290543a4e9 pid=2015 runtime=io.containerd.runc.v2 May 16 00:51:29.666225 systemd[1]: Started cri-containerd-cfe1401df4c53fee9084609e11895705780461c97a09c536b7f627290543a4e9.scope. May 16 00:51:29.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688552 kernel: kauditd_printk_skb: 265 callbacks suppressed May 16 00:51:29.688655 kernel: audit: type=1400 audit(1747356689.684:811): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688702 kernel: audit: type=1400 audit(1747356689.684:812): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.691985 kernel: audit: type=1400 audit(1747356689.684:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.692054 kernel: audit: type=1400 audit(1747356689.684:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.695404 kernel: audit: type=1400 audit(1747356689.684:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.695465 kernel: audit: type=1400 audit(1747356689.684:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.698927 kernel: audit: type=1400 audit(1747356689.684:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.698992 kernel: audit: type=1400 audit(1747356689.684:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.703484 kernel: audit: type=1400 audit(1747356689.684:819): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.705338 kernel: audit: type=1400 audit(1747356689.685:820): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.685000 audit: BPF prog-id=103 op=LOAD May 16 00:51:29.687000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2015 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366653134303164663463353366656539303834363039653131383935 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2015 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366653134303164663463353366656539303834363039653131383935 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.687000 audit: BPF prog-id=104 op=LOAD May 16 00:51:29.687000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2015 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366653134303164663463353366656539303834363039653131383935 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.688000 audit: BPF prog-id=105 op=LOAD May 16 00:51:29.688000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2015 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366653134303164663463353366656539303834363039653131383935 May 16 00:51:29.690000 audit: BPF prog-id=105 op=UNLOAD May 16 00:51:29.690000 audit: BPF prog-id=104 op=UNLOAD May 16 00:51:29.690000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { perfmon } for pid=2025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit[2025]: AVC avc: denied { bpf } for pid=2025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.690000 audit: BPF prog-id=106 op=LOAD May 16 00:51:29.690000 audit[2025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2015 pid=2025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.690000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366653134303164663463353366656539303834363039653131383935 May 16 00:51:29.708711 env[1213]: time="2025-05-16T00:51:29.708576978Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-84qzb,Uid:1ba93f30-8020-4133-9efe-1fbc1cbb205f,Namespace:kube-system,Attempt:0,} returns sandbox id \"cfe1401df4c53fee9084609e11895705780461c97a09c536b7f627290543a4e9\"" May 16 00:51:29.709395 kubelet[1956]: E0516 00:51:29.709363 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:29.711612 env[1213]: time="2025-05-16T00:51:29.711561139Z" level=info msg="CreateContainer within sandbox \"cfe1401df4c53fee9084609e11895705780461c97a09c536b7f627290543a4e9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 16 00:51:29.728114 env[1213]: time="2025-05-16T00:51:29.728064733Z" level=info msg="CreateContainer within sandbox \"cfe1401df4c53fee9084609e11895705780461c97a09c536b7f627290543a4e9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"acd31aa18a6ab80997149a6fbebd95a83815aaa6b1d8cb65e86dab0ce8427174\"" May 16 00:51:29.728657 env[1213]: time="2025-05-16T00:51:29.728631562Z" level=info msg="StartContainer for \"acd31aa18a6ab80997149a6fbebd95a83815aaa6b1d8cb65e86dab0ce8427174\"" May 16 00:51:29.744771 systemd[1]: Started cri-containerd-acd31aa18a6ab80997149a6fbebd95a83815aaa6b1d8cb65e86dab0ce8427174.scope. May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2015 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643331616131386136616238303939373134396136666265626439 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit: BPF prog-id=107 op=LOAD May 16 00:51:29.773000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2015 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643331616131386136616238303939373134396136666265626439 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit: BPF prog-id=108 op=LOAD May 16 00:51:29.773000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2015 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643331616131386136616238303939373134396136666265626439 May 16 00:51:29.773000 audit: BPF prog-id=108 op=UNLOAD May 16 00:51:29.773000 audit: BPF prog-id=107 op=UNLOAD May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { perfmon } for pid=2056 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit[2056]: AVC avc: denied { bpf } for pid=2056 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.773000 audit: BPF prog-id=109 op=LOAD May 16 00:51:29.773000 audit[2056]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2015 pid=2056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643331616131386136616238303939373134396136666265626439 May 16 00:51:29.792893 env[1213]: time="2025-05-16T00:51:29.790257369Z" level=info msg="StartContainer for \"acd31aa18a6ab80997149a6fbebd95a83815aaa6b1d8cb65e86dab0ce8427174\" returns successfully" May 16 00:51:29.910762 env[1213]: time="2025-05-16T00:51:29.910634636Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-59zjr,Uid:4d1f04d3-7699-418f-9951-71d917061f6a,Namespace:tigera-operator,Attempt:0,}" May 16 00:51:29.924916 env[1213]: time="2025-05-16T00:51:29.924828192Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:29.924916 env[1213]: time="2025-05-16T00:51:29.924894880Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:29.924916 env[1213]: time="2025-05-16T00:51:29.924907041Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:29.925415 env[1213]: time="2025-05-16T00:51:29.925365577Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8501944295543b222feda92e32f513f401b2cb2e0636d280381b9bf900d1ff5 pid=2098 runtime=io.containerd.runc.v2 May 16 00:51:29.937337 systemd[1]: Started cri-containerd-c8501944295543b222feda92e32f513f401b2cb2e0636d280381b9bf900d1ff5.scope. May 16 00:51:29.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.967000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit: BPF prog-id=110 op=LOAD May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2098 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353031393434323935353433623232326665646139326533326635 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2098 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353031393434323935353433623232326665646139326533326635 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit: BPF prog-id=111 op=LOAD May 16 00:51:29.968000 audit[2109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2098 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353031393434323935353433623232326665646139326533326635 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit: BPF prog-id=112 op=LOAD May 16 00:51:29.968000 audit[2109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2098 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353031393434323935353433623232326665646139326533326635 May 16 00:51:29.968000 audit: BPF prog-id=112 op=UNLOAD May 16 00:51:29.968000 audit: BPF prog-id=111 op=UNLOAD May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { perfmon } for pid=2109 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit[2109]: AVC avc: denied { bpf } for pid=2109 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:29.968000 audit: BPF prog-id=113 op=LOAD May 16 00:51:29.968000 audit[2109]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2098 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338353031393434323935353433623232326665646139326533326635 May 16 00:51:29.990552 env[1213]: time="2025-05-16T00:51:29.990508969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-59zjr,Uid:4d1f04d3-7699-418f-9951-71d917061f6a,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c8501944295543b222feda92e32f513f401b2cb2e0636d280381b9bf900d1ff5\"" May 16 00:51:29.992963 env[1213]: time="2025-05-16T00:51:29.992923661Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 16 00:51:29.999000 audit[2157]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:29.999000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa2c8180 a2=0 a3=1 items=0 ppid=2066 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:29.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 16 00:51:30.001000 audit[2158]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.001000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8f2fa90 a2=0 a3=1 items=0 ppid=2066 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 16 00:51:30.002000 audit[2159]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.002000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe196e150 a2=0 a3=1 items=0 ppid=2066 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.002000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 16 00:51:30.003000 audit[2160]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.003000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdeecdca0 a2=0 a3=1 items=0 ppid=2066 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.003000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 16 00:51:30.004000 audit[2161]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.004000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffebd20e50 a2=0 a3=1 items=0 ppid=2066 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.004000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 16 00:51:30.005000 audit[2162]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2162 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.005000 audit[2162]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe13eb660 a2=0 a3=1 items=0 ppid=2066 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.005000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 16 00:51:30.101000 audit[2163]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.101000 audit[2163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff0a6c610 a2=0 a3=1 items=0 ppid=2066 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.101000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 16 00:51:30.106000 audit[2165]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.106000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc5ab9540 a2=0 a3=1 items=0 ppid=2066 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 16 00:51:30.109000 audit[2168]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.109000 audit[2168]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffee9a2320 a2=0 a3=1 items=0 ppid=2066 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 16 00:51:30.110000 audit[2169]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.110000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff9adeb50 a2=0 a3=1 items=0 ppid=2066 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.110000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 16 00:51:30.113000 audit[2171]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.113000 audit[2171]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc79cf630 a2=0 a3=1 items=0 ppid=2066 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 16 00:51:30.114000 audit[2172]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.114000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe113fd60 a2=0 a3=1 items=0 ppid=2066 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.114000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 16 00:51:30.116000 audit[2174]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2174 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.116000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd0d4e9f0 a2=0 a3=1 items=0 ppid=2066 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 16 00:51:30.120000 audit[2177]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.120000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc80205a0 a2=0 a3=1 items=0 ppid=2066 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 16 00:51:30.121000 audit[2178]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.121000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc7e694f0 a2=0 a3=1 items=0 ppid=2066 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.121000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 16 00:51:30.124000 audit[2180]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.124000 audit[2180]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffef6dd140 a2=0 a3=1 items=0 ppid=2066 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 16 00:51:30.125000 audit[2181]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.125000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4f7f610 a2=0 a3=1 items=0 ppid=2066 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 16 00:51:30.127000 audit[2183]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.127000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe17295a0 a2=0 a3=1 items=0 ppid=2066 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:51:30.131000 audit[2186]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.131000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff75afdd0 a2=0 a3=1 items=0 ppid=2066 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:51:30.134000 audit[2189]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.134000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffd04bd80 a2=0 a3=1 items=0 ppid=2066 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.134000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 16 00:51:30.136000 audit[2190]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.136000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdd56c600 a2=0 a3=1 items=0 ppid=2066 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 16 00:51:30.138000 audit[2192]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.138000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffcdc04830 a2=0 a3=1 items=0 ppid=2066 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.138000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:51:30.141000 audit[2195]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.141000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa14f470 a2=0 a3=1 items=0 ppid=2066 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.141000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:51:30.143000 audit[2196]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.143000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd483ed10 a2=0 a3=1 items=0 ppid=2066 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 16 00:51:30.145000 audit[2198]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:51:30.145000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc0cf9ac0 a2=0 a3=1 items=0 ppid=2066 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 16 00:51:30.169000 audit[2204]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:30.169000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc8747b90 a2=0 a3=1 items=0 ppid=2066 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:30.186000 audit[2204]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:30.186000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffc8747b90 a2=0 a3=1 items=0 ppid=2066 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:30.188000 audit[2209]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.188000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd8fd5cd0 a2=0 a3=1 items=0 ppid=2066 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 16 00:51:30.190000 audit[2211]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.190000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffffaf1fe00 a2=0 a3=1 items=0 ppid=2066 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 16 00:51:30.193000 audit[2214]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.193000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffcb2f2be0 a2=0 a3=1 items=0 ppid=2066 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 16 00:51:30.194000 audit[2215]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.194000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff780b450 a2=0 a3=1 items=0 ppid=2066 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.194000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 16 00:51:30.196000 audit[2217]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.196000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff11f3f40 a2=0 a3=1 items=0 ppid=2066 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.196000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 16 00:51:30.198000 audit[2218]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.198000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee57d6f0 a2=0 a3=1 items=0 ppid=2066 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 16 00:51:30.200000 audit[2220]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.200000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff9d91860 a2=0 a3=1 items=0 ppid=2066 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.200000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 16 00:51:30.204000 audit[2223]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.204000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff0e51e80 a2=0 a3=1 items=0 ppid=2066 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 16 00:51:30.206000 audit[2224]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.206000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8c31c50 a2=0 a3=1 items=0 ppid=2066 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.206000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 16 00:51:30.208000 audit[2226]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.208000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd9470b10 a2=0 a3=1 items=0 ppid=2066 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.208000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 16 00:51:30.209000 audit[2227]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.209000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff77b1580 a2=0 a3=1 items=0 ppid=2066 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.209000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 16 00:51:30.212000 audit[2229]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.212000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff10ec360 a2=0 a3=1 items=0 ppid=2066 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.212000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:51:30.215000 audit[2232]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.215000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcc981540 a2=0 a3=1 items=0 ppid=2066 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.215000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 16 00:51:30.219000 audit[2235]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.219000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd6640700 a2=0 a3=1 items=0 ppid=2066 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.219000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 16 00:51:30.220000 audit[2236]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.220000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffee63d730 a2=0 a3=1 items=0 ppid=2066 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 16 00:51:30.222000 audit[2238]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.222000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcdeff140 a2=0 a3=1 items=0 ppid=2066 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:51:30.225000 audit[2241]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.225000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe511cae0 a2=0 a3=1 items=0 ppid=2066 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.225000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:51:30.226000 audit[2242]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.226000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf70c0a0 a2=0 a3=1 items=0 ppid=2066 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 16 00:51:30.229000 audit[2244]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.229000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe83188e0 a2=0 a3=1 items=0 ppid=2066 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 16 00:51:30.230000 audit[2245]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.230000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff3b551b0 a2=0 a3=1 items=0 ppid=2066 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 16 00:51:30.232000 audit[2247]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.232000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffce452130 a2=0 a3=1 items=0 ppid=2066 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:51:30.235000 audit[2250]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:51:30.235000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffff462340 a2=0 a3=1 items=0 ppid=2066 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:51:30.238000 audit[2252]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 16 00:51:30.238000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffdc7dc2b0 a2=0 a3=1 items=0 ppid=2066 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.238000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:30.238000 audit[2252]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 16 00:51:30.238000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffdc7dc2b0 a2=0 a3=1 items=0 ppid=2066 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:30.238000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:30.301382 kubelet[1956]: E0516 00:51:30.301349 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:30.527795 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1724099827.mount: Deactivated successfully. May 16 00:51:31.127099 kubelet[1956]: E0516 00:51:31.127056 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:31.143863 kubelet[1956]: I0516 00:51:31.143761 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-84qzb" podStartSLOduration=2.143743059 podStartE2EDuration="2.143743059s" podCreationTimestamp="2025-05-16 00:51:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:51:30.313660466 +0000 UTC m=+8.132783850" watchObservedRunningTime="2025-05-16 00:51:31.143743059 +0000 UTC m=+8.962866323" May 16 00:51:31.150289 kubelet[1956]: E0516 00:51:31.150254 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:31.303252 kubelet[1956]: E0516 00:51:31.303210 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:31.303674 kubelet[1956]: E0516 00:51:31.303622 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:31.465087 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1656442163.mount: Deactivated successfully. May 16 00:51:32.095258 env[1213]: time="2025-05-16T00:51:32.095211253Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:32.097052 env[1213]: time="2025-05-16T00:51:32.097019953Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:32.098347 env[1213]: time="2025-05-16T00:51:32.098313282Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:32.100442 env[1213]: time="2025-05-16T00:51:32.100408651Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:32.101033 env[1213]: time="2025-05-16T00:51:32.100996429Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b\"" May 16 00:51:32.103802 env[1213]: time="2025-05-16T00:51:32.103755504Z" level=info msg="CreateContainer within sandbox \"c8501944295543b222feda92e32f513f401b2cb2e0636d280381b9bf900d1ff5\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 16 00:51:32.114454 env[1213]: time="2025-05-16T00:51:32.114402924Z" level=info msg="CreateContainer within sandbox \"c8501944295543b222feda92e32f513f401b2cb2e0636d280381b9bf900d1ff5\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"3a1a4359c511fc22c47a6039ecf500b9968f3acf926a8dc0c7bf7ca808efa5d9\"" May 16 00:51:32.115869 env[1213]: time="2025-05-16T00:51:32.115264570Z" level=info msg="StartContainer for \"3a1a4359c511fc22c47a6039ecf500b9968f3acf926a8dc0c7bf7ca808efa5d9\"" May 16 00:51:32.142421 systemd[1]: Started cri-containerd-3a1a4359c511fc22c47a6039ecf500b9968f3acf926a8dc0c7bf7ca808efa5d9.scope. May 16 00:51:32.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.162000 audit: BPF prog-id=114 op=LOAD May 16 00:51:32.162000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.162000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2098 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:32.162000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316134333539633531316663323263343761363033396563663530 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2098 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:32.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316134333539633531316663323263343761363033396563663530 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.163000 audit: BPF prog-id=115 op=LOAD May 16 00:51:32.163000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2098 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:32.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316134333539633531316663323263343761363033396563663530 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit: BPF prog-id=116 op=LOAD May 16 00:51:32.164000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2098 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:32.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316134333539633531316663323263343761363033396563663530 May 16 00:51:32.164000 audit: BPF prog-id=116 op=UNLOAD May 16 00:51:32.164000 audit: BPF prog-id=115 op=UNLOAD May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:32.164000 audit: BPF prog-id=117 op=LOAD May 16 00:51:32.164000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2098 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:32.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361316134333539633531316663323263343761363033396563663530 May 16 00:51:32.178907 env[1213]: time="2025-05-16T00:51:32.177602657Z" level=info msg="StartContainer for \"3a1a4359c511fc22c47a6039ecf500b9968f3acf926a8dc0c7bf7ca808efa5d9\" returns successfully" May 16 00:51:32.314840 kubelet[1956]: I0516 00:51:32.314782 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7c5755cdcb-59zjr" podStartSLOduration=1.204884879 podStartE2EDuration="3.314764276s" podCreationTimestamp="2025-05-16 00:51:29 +0000 UTC" firstStartedPulling="2025-05-16 00:51:29.992510891 +0000 UTC m=+7.811634155" lastFinishedPulling="2025-05-16 00:51:32.102390288 +0000 UTC m=+9.921513552" observedRunningTime="2025-05-16 00:51:32.314578737 +0000 UTC m=+10.133702001" watchObservedRunningTime="2025-05-16 00:51:32.314764276 +0000 UTC m=+10.133887540" May 16 00:51:34.444220 kubelet[1956]: E0516 00:51:34.444184 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:37.860070 sudo[1353]: pam_unix(sudo:session): session closed for user root May 16 00:51:37.862524 kernel: kauditd_printk_skb: 357 callbacks suppressed May 16 00:51:37.862646 kernel: audit: type=1106 audit(1747356697.859:922): pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:51:37.859000 audit[1353]: USER_END pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:51:37.861000 audit[1353]: CRED_DISP pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:51:37.865657 kernel: audit: type=1104 audit(1747356697.861:923): pid=1353 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:51:37.866549 sshd[1350]: pam_unix(sshd:session): session closed for user core May 16 00:51:37.869000 audit[1350]: USER_END pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:51:37.869000 audit[1350]: CRED_DISP pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:51:37.874778 systemd-logind[1201]: Session 7 logged out. Waiting for processes to exit. May 16 00:51:37.875675 systemd[1]: session-7.scope: Deactivated successfully. May 16 00:51:37.875876 systemd[1]: session-7.scope: Consumed 6.433s CPU time. May 16 00:51:37.876526 kernel: audit: type=1106 audit(1747356697.869:924): pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:51:37.876582 kernel: audit: type=1104 audit(1747356697.869:925): pid=1350 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:51:37.876253 systemd-logind[1201]: Removed session 7. May 16 00:51:37.876437 systemd[1]: sshd@6-10.0.0.127:22-10.0.0.1:35610.service: Deactivated successfully. May 16 00:51:37.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.127:22-10.0.0.1:35610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:37.878814 kernel: audit: type=1131 audit(1747356697.875:926): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.127:22-10.0.0.1:35610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:37.990266 update_engine[1204]: I0516 00:51:37.989874 1204 update_attempter.cc:509] Updating boot flags... May 16 00:51:38.575000 audit[2361]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:38.578886 kernel: audit: type=1325 audit(1747356698.575:927): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:38.575000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffad5e480 a2=0 a3=1 items=0 ppid=2066 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:38.575000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:38.583188 kernel: audit: type=1300 audit(1747356698.575:927): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffad5e480 a2=0 a3=1 items=0 ppid=2066 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:38.583285 kernel: audit: type=1327 audit(1747356698.575:927): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:38.586000 audit[2361]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:38.586000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffad5e480 a2=0 a3=1 items=0 ppid=2066 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:38.591880 kernel: audit: type=1325 audit(1747356698.586:928): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:38.591939 kernel: audit: type=1300 audit(1747356698.586:928): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffad5e480 a2=0 a3=1 items=0 ppid=2066 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:38.586000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:38.610000 audit[2363]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:38.610000 audit[2363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe419a090 a2=0 a3=1 items=0 ppid=2066 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:38.610000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:38.614000 audit[2363]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:38.614000 audit[2363]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe419a090 a2=0 a3=1 items=0 ppid=2066 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:38.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:41.067000 audit[2366]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:41.067000 audit[2366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffead3d1f0 a2=0 a3=1 items=0 ppid=2066 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:41.073000 audit[2366]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:41.073000 audit[2366]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffead3d1f0 a2=0 a3=1 items=0 ppid=2066 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:41.088000 audit[2368]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:41.088000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffff32ec800 a2=0 a3=1 items=0 ppid=2066 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:41.093000 audit[2368]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:41.093000 audit[2368]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff32ec800 a2=0 a3=1 items=0 ppid=2066 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:41.359116 systemd[1]: Created slice kubepods-besteffort-podb791b1cc_3c41_4732_bdcc_68bc17ec24d7.slice. May 16 00:51:41.394043 kubelet[1956]: I0516 00:51:41.393985 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b791b1cc-3c41-4732-bdcc-68bc17ec24d7-tigera-ca-bundle\") pod \"calico-typha-7db5ff58c7-r728g\" (UID: \"b791b1cc-3c41-4732-bdcc-68bc17ec24d7\") " pod="calico-system/calico-typha-7db5ff58c7-r728g" May 16 00:51:41.394043 kubelet[1956]: I0516 00:51:41.394033 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/b791b1cc-3c41-4732-bdcc-68bc17ec24d7-typha-certs\") pod \"calico-typha-7db5ff58c7-r728g\" (UID: \"b791b1cc-3c41-4732-bdcc-68bc17ec24d7\") " pod="calico-system/calico-typha-7db5ff58c7-r728g" May 16 00:51:41.394043 kubelet[1956]: I0516 00:51:41.394053 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5sbms\" (UniqueName: \"kubernetes.io/projected/b791b1cc-3c41-4732-bdcc-68bc17ec24d7-kube-api-access-5sbms\") pod \"calico-typha-7db5ff58c7-r728g\" (UID: \"b791b1cc-3c41-4732-bdcc-68bc17ec24d7\") " pod="calico-system/calico-typha-7db5ff58c7-r728g" May 16 00:51:41.662567 kubelet[1956]: E0516 00:51:41.662472 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:41.663060 env[1213]: time="2025-05-16T00:51:41.663020023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7db5ff58c7-r728g,Uid:b791b1cc-3c41-4732-bdcc-68bc17ec24d7,Namespace:calico-system,Attempt:0,}" May 16 00:51:41.679926 env[1213]: time="2025-05-16T00:51:41.679087518Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:41.679926 env[1213]: time="2025-05-16T00:51:41.679131401Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:41.679926 env[1213]: time="2025-05-16T00:51:41.679141961Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:41.679926 env[1213]: time="2025-05-16T00:51:41.679278089Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbef143b7189b8c9bb574b2fe1107b8f2a5a2540e305f55842e951de1b5c1f14 pid=2379 runtime=io.containerd.runc.v2 May 16 00:51:41.695955 systemd[1]: Started cri-containerd-cbef143b7189b8c9bb574b2fe1107b8f2a5a2540e305f55842e951de1b5c1f14.scope. May 16 00:51:41.738589 systemd[1]: Created slice kubepods-besteffort-pod63ae994a_f5f0_47af_bc04_b2ca02e2a99e.slice. May 16 00:51:41.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.749000 audit: BPF prog-id=118 op=LOAD May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2379 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362656631343362373138396238633962623537346232666531313037 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2379 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362656631343362373138396238633962623537346232666531313037 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit: BPF prog-id=119 op=LOAD May 16 00:51:41.750000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2379 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362656631343362373138396238633962623537346232666531313037 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit: BPF prog-id=120 op=LOAD May 16 00:51:41.750000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2379 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362656631343362373138396238633962623537346232666531313037 May 16 00:51:41.750000 audit: BPF prog-id=120 op=UNLOAD May 16 00:51:41.750000 audit: BPF prog-id=119 op=UNLOAD May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:41.750000 audit: BPF prog-id=121 op=LOAD May 16 00:51:41.750000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2379 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:41.750000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362656631343362373138396238633962623537346232666531313037 May 16 00:51:41.772572 env[1213]: time="2025-05-16T00:51:41.772528964Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7db5ff58c7-r728g,Uid:b791b1cc-3c41-4732-bdcc-68bc17ec24d7,Namespace:calico-system,Attempt:0,} returns sandbox id \"cbef143b7189b8c9bb574b2fe1107b8f2a5a2540e305f55842e951de1b5c1f14\"" May 16 00:51:41.773343 kubelet[1956]: E0516 00:51:41.773320 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:41.775989 env[1213]: time="2025-05-16T00:51:41.775961515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 16 00:51:41.796282 kubelet[1956]: I0516 00:51:41.796250 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-cni-bin-dir\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.796471 kubelet[1956]: I0516 00:51:41.796444 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-flexvol-driver-host\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.796593 kubelet[1956]: I0516 00:51:41.796579 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-lib-modules\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.796709 kubelet[1956]: I0516 00:51:41.796695 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-var-lib-calico\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.796818 kubelet[1956]: I0516 00:51:41.796804 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-xtables-lock\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.796955 kubelet[1956]: I0516 00:51:41.796940 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kjz7g\" (UniqueName: \"kubernetes.io/projected/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-kube-api-access-kjz7g\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.797059 kubelet[1956]: I0516 00:51:41.797045 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-cni-net-dir\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.797165 kubelet[1956]: I0516 00:51:41.797152 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-cni-log-dir\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.797272 kubelet[1956]: I0516 00:51:41.797258 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-tigera-ca-bundle\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.797392 kubelet[1956]: I0516 00:51:41.797378 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-var-run-calico\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.797494 kubelet[1956]: I0516 00:51:41.797482 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-node-certs\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.797611 kubelet[1956]: I0516 00:51:41.797588 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/63ae994a-f5f0-47af-bc04-b2ca02e2a99e-policysync\") pod \"calico-node-kdhrc\" (UID: \"63ae994a-f5f0-47af-bc04-b2ca02e2a99e\") " pod="calico-system/calico-node-kdhrc" May 16 00:51:41.899652 kubelet[1956]: E0516 00:51:41.899607 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:41.899829 kubelet[1956]: W0516 00:51:41.899815 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:41.899940 kubelet[1956]: E0516 00:51:41.899926 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:41.901303 kubelet[1956]: E0516 00:51:41.901286 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:41.901303 kubelet[1956]: W0516 00:51:41.901302 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:41.901389 kubelet[1956]: E0516 00:51:41.901316 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:41.909207 kubelet[1956]: E0516 00:51:41.909187 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:41.909207 kubelet[1956]: W0516 00:51:41.909204 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:41.909319 kubelet[1956]: E0516 00:51:41.909218 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.027041 kubelet[1956]: E0516 00:51:42.026939 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfrqm" podUID="561a2113-fd27-44d9-9df0-c2cfce17e3bf" May 16 00:51:42.042826 env[1213]: time="2025-05-16T00:51:42.042782914Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kdhrc,Uid:63ae994a-f5f0-47af-bc04-b2ca02e2a99e,Namespace:calico-system,Attempt:0,}" May 16 00:51:42.056923 env[1213]: time="2025-05-16T00:51:42.056837088Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:42.056923 env[1213]: time="2025-05-16T00:51:42.056893131Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:42.056923 env[1213]: time="2025-05-16T00:51:42.056903811Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:42.057167 env[1213]: time="2025-05-16T00:51:42.057128423Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5 pid=2426 runtime=io.containerd.runc.v2 May 16 00:51:42.066743 systemd[1]: Started cri-containerd-69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5.scope. May 16 00:51:42.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit: BPF prog-id=122 op=LOAD May 16 00:51:42.092000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:42.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363532616234303630396163326530373137653832336537393237 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:42.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363532616234303630396163326530373137653832336537393237 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.092000 audit: BPF prog-id=123 op=LOAD May 16 00:51:42.092000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:42.092000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363532616234303630396163326530373137653832336537393237 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit: BPF prog-id=124 op=LOAD May 16 00:51:42.093000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:42.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363532616234303630396163326530373137653832336537393237 May 16 00:51:42.093000 audit: BPF prog-id=124 op=UNLOAD May 16 00:51:42.093000 audit: BPF prog-id=123 op=UNLOAD May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { perfmon } for pid=2436 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit[2436]: AVC avc: denied { bpf } for pid=2436 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:42.093000 audit: BPF prog-id=125 op=LOAD May 16 00:51:42.093000 audit[2436]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2426 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:42.093000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639363532616234303630396163326530373137653832336537393237 May 16 00:51:42.096086 kubelet[1956]: E0516 00:51:42.094935 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096086 kubelet[1956]: W0516 00:51:42.094954 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096086 kubelet[1956]: E0516 00:51:42.094974 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096086 kubelet[1956]: E0516 00:51:42.095176 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096086 kubelet[1956]: W0516 00:51:42.095183 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096086 kubelet[1956]: E0516 00:51:42.095192 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096086 kubelet[1956]: E0516 00:51:42.095348 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096086 kubelet[1956]: W0516 00:51:42.095356 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096086 kubelet[1956]: E0516 00:51:42.095364 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096086 kubelet[1956]: E0516 00:51:42.095557 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096308 kubelet[1956]: W0516 00:51:42.095563 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096308 kubelet[1956]: E0516 00:51:42.095570 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096308 kubelet[1956]: E0516 00:51:42.095728 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096308 kubelet[1956]: W0516 00:51:42.095740 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096308 kubelet[1956]: E0516 00:51:42.095748 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096308 kubelet[1956]: E0516 00:51:42.095897 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096308 kubelet[1956]: W0516 00:51:42.095905 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096308 kubelet[1956]: E0516 00:51:42.095912 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096308 kubelet[1956]: E0516 00:51:42.096075 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096308 kubelet[1956]: W0516 00:51:42.096084 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096505 kubelet[1956]: E0516 00:51:42.096091 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096505 kubelet[1956]: E0516 00:51:42.096222 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096505 kubelet[1956]: W0516 00:51:42.096233 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096505 kubelet[1956]: E0516 00:51:42.096241 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096505 kubelet[1956]: E0516 00:51:42.096398 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096505 kubelet[1956]: W0516 00:51:42.096405 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096505 kubelet[1956]: E0516 00:51:42.096413 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096656 kubelet[1956]: E0516 00:51:42.096540 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096656 kubelet[1956]: W0516 00:51:42.096551 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096656 kubelet[1956]: E0516 00:51:42.096558 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096718 kubelet[1956]: E0516 00:51:42.096701 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096718 kubelet[1956]: W0516 00:51:42.096708 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096718 kubelet[1956]: E0516 00:51:42.096714 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.096860 kubelet[1956]: E0516 00:51:42.096838 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.096907 kubelet[1956]: W0516 00:51:42.096870 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.096907 kubelet[1956]: E0516 00:51:42.096878 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.097058 kubelet[1956]: E0516 00:51:42.097042 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.097058 kubelet[1956]: W0516 00:51:42.097054 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.097126 kubelet[1956]: E0516 00:51:42.097062 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.097213 kubelet[1956]: E0516 00:51:42.097195 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.097213 kubelet[1956]: W0516 00:51:42.097210 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.097263 kubelet[1956]: E0516 00:51:42.097218 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.097341 kubelet[1956]: E0516 00:51:42.097330 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.097366 kubelet[1956]: W0516 00:51:42.097339 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.097366 kubelet[1956]: E0516 00:51:42.097351 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.097482 kubelet[1956]: E0516 00:51:42.097471 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.097506 kubelet[1956]: W0516 00:51:42.097480 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.097506 kubelet[1956]: E0516 00:51:42.097492 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.097646 kubelet[1956]: E0516 00:51:42.097627 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.097646 kubelet[1956]: W0516 00:51:42.097643 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.097697 kubelet[1956]: E0516 00:51:42.097652 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.097795 kubelet[1956]: E0516 00:51:42.097780 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.097821 kubelet[1956]: W0516 00:51:42.097797 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.097821 kubelet[1956]: E0516 00:51:42.097805 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.097965 kubelet[1956]: E0516 00:51:42.097951 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.097965 kubelet[1956]: W0516 00:51:42.097962 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.098019 kubelet[1956]: E0516 00:51:42.097970 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.098102 kubelet[1956]: E0516 00:51:42.098090 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.098129 kubelet[1956]: W0516 00:51:42.098099 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.098129 kubelet[1956]: E0516 00:51:42.098112 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.099382 kubelet[1956]: E0516 00:51:42.099351 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.099382 kubelet[1956]: W0516 00:51:42.099370 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.099382 kubelet[1956]: E0516 00:51:42.099384 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.099486 kubelet[1956]: I0516 00:51:42.099407 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/561a2113-fd27-44d9-9df0-c2cfce17e3bf-socket-dir\") pod \"csi-node-driver-vfrqm\" (UID: \"561a2113-fd27-44d9-9df0-c2cfce17e3bf\") " pod="calico-system/csi-node-driver-vfrqm" May 16 00:51:42.099617 kubelet[1956]: E0516 00:51:42.099600 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.099674 kubelet[1956]: W0516 00:51:42.099618 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.099674 kubelet[1956]: E0516 00:51:42.099637 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.099674 kubelet[1956]: I0516 00:51:42.099652 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/561a2113-fd27-44d9-9df0-c2cfce17e3bf-varrun\") pod \"csi-node-driver-vfrqm\" (UID: \"561a2113-fd27-44d9-9df0-c2cfce17e3bf\") " pod="calico-system/csi-node-driver-vfrqm" May 16 00:51:42.099848 kubelet[1956]: E0516 00:51:42.099829 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.099848 kubelet[1956]: W0516 00:51:42.099842 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.099934 kubelet[1956]: E0516 00:51:42.099871 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.099934 kubelet[1956]: I0516 00:51:42.099888 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tz5bh\" (UniqueName: \"kubernetes.io/projected/561a2113-fd27-44d9-9df0-c2cfce17e3bf-kube-api-access-tz5bh\") pod \"csi-node-driver-vfrqm\" (UID: \"561a2113-fd27-44d9-9df0-c2cfce17e3bf\") " pod="calico-system/csi-node-driver-vfrqm" May 16 00:51:42.100065 kubelet[1956]: E0516 00:51:42.100042 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.100065 kubelet[1956]: W0516 00:51:42.100056 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.100124 kubelet[1956]: E0516 00:51:42.100068 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.100124 kubelet[1956]: I0516 00:51:42.100084 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/561a2113-fd27-44d9-9df0-c2cfce17e3bf-registration-dir\") pod \"csi-node-driver-vfrqm\" (UID: \"561a2113-fd27-44d9-9df0-c2cfce17e3bf\") " pod="calico-system/csi-node-driver-vfrqm" May 16 00:51:42.100292 kubelet[1956]: E0516 00:51:42.100275 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.100292 kubelet[1956]: W0516 00:51:42.100290 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.100363 kubelet[1956]: E0516 00:51:42.100305 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.100455 kubelet[1956]: E0516 00:51:42.100444 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.100455 kubelet[1956]: W0516 00:51:42.100453 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.100513 kubelet[1956]: E0516 00:51:42.100462 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.100634 kubelet[1956]: E0516 00:51:42.100615 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.100634 kubelet[1956]: W0516 00:51:42.100633 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.100690 kubelet[1956]: E0516 00:51:42.100644 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.100690 kubelet[1956]: I0516 00:51:42.100661 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/561a2113-fd27-44d9-9df0-c2cfce17e3bf-kubelet-dir\") pod \"csi-node-driver-vfrqm\" (UID: \"561a2113-fd27-44d9-9df0-c2cfce17e3bf\") " pod="calico-system/csi-node-driver-vfrqm" May 16 00:51:42.100939 kubelet[1956]: E0516 00:51:42.100919 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.100939 kubelet[1956]: W0516 00:51:42.100936 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.101011 kubelet[1956]: E0516 00:51:42.100951 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.101120 kubelet[1956]: E0516 00:51:42.101104 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.101120 kubelet[1956]: W0516 00:51:42.101114 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.101184 kubelet[1956]: E0516 00:51:42.101123 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.101288 kubelet[1956]: E0516 00:51:42.101271 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.101288 kubelet[1956]: W0516 00:51:42.101281 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.101348 kubelet[1956]: E0516 00:51:42.101290 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.101454 kubelet[1956]: E0516 00:51:42.101438 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.101454 kubelet[1956]: W0516 00:51:42.101449 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.101526 kubelet[1956]: E0516 00:51:42.101499 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.101629 kubelet[1956]: E0516 00:51:42.101606 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.101629 kubelet[1956]: W0516 00:51:42.101617 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.101737 kubelet[1956]: E0516 00:51:42.101652 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.101799 kubelet[1956]: E0516 00:51:42.101774 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.101799 kubelet[1956]: W0516 00:51:42.101784 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.101799 kubelet[1956]: E0516 00:51:42.101796 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.102024 kubelet[1956]: E0516 00:51:42.102002 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.102024 kubelet[1956]: W0516 00:51:42.102014 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.102097 kubelet[1956]: E0516 00:51:42.102040 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.102237 kubelet[1956]: E0516 00:51:42.102217 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.102237 kubelet[1956]: W0516 00:51:42.102229 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.102237 kubelet[1956]: E0516 00:51:42.102238 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.108516 env[1213]: time="2025-05-16T00:51:42.108466744Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-kdhrc,Uid:63ae994a-f5f0-47af-bc04-b2ca02e2a99e,Namespace:calico-system,Attempt:0,} returns sandbox id \"69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5\"" May 16 00:51:42.107000 audit[2494]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:42.107000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffd5d30cf0 a2=0 a3=1 items=0 ppid=2066 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:42.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:42.113000 audit[2494]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2494 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:42.113000 audit[2494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd5d30cf0 a2=0 a3=1 items=0 ppid=2066 pid=2494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:42.113000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:42.201883 kubelet[1956]: E0516 00:51:42.201813 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.201883 kubelet[1956]: W0516 00:51:42.201833 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.201883 kubelet[1956]: E0516 00:51:42.201870 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.202089 kubelet[1956]: E0516 00:51:42.202074 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.202089 kubelet[1956]: W0516 00:51:42.202085 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.202151 kubelet[1956]: E0516 00:51:42.202101 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.202327 kubelet[1956]: E0516 00:51:42.202314 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.202327 kubelet[1956]: W0516 00:51:42.202324 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.202403 kubelet[1956]: E0516 00:51:42.202333 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.202523 kubelet[1956]: E0516 00:51:42.202500 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.202523 kubelet[1956]: W0516 00:51:42.202511 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.202523 kubelet[1956]: E0516 00:51:42.202519 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.202766 kubelet[1956]: E0516 00:51:42.202748 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.202766 kubelet[1956]: W0516 00:51:42.202759 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.202845 kubelet[1956]: E0516 00:51:42.202771 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.203045 kubelet[1956]: E0516 00:51:42.203015 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.203045 kubelet[1956]: W0516 00:51:42.203029 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.203045 kubelet[1956]: E0516 00:51:42.203044 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.203215 kubelet[1956]: E0516 00:51:42.203202 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.203215 kubelet[1956]: W0516 00:51:42.203213 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.203293 kubelet[1956]: E0516 00:51:42.203279 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.203382 kubelet[1956]: E0516 00:51:42.203373 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.203408 kubelet[1956]: W0516 00:51:42.203383 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.203462 kubelet[1956]: E0516 00:51:42.203447 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.203591 kubelet[1956]: E0516 00:51:42.203578 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.203591 kubelet[1956]: W0516 00:51:42.203591 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.203686 kubelet[1956]: E0516 00:51:42.203670 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.203761 kubelet[1956]: E0516 00:51:42.203750 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.203761 kubelet[1956]: W0516 00:51:42.203759 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.203833 kubelet[1956]: E0516 00:51:42.203803 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.204308 kubelet[1956]: E0516 00:51:42.204286 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.204341 kubelet[1956]: W0516 00:51:42.204315 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.204384 kubelet[1956]: E0516 00:51:42.204367 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.204506 kubelet[1956]: E0516 00:51:42.204494 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.204506 kubelet[1956]: W0516 00:51:42.204506 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.204573 kubelet[1956]: E0516 00:51:42.204544 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.204670 kubelet[1956]: E0516 00:51:42.204655 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.204670 kubelet[1956]: W0516 00:51:42.204667 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.204730 kubelet[1956]: E0516 00:51:42.204689 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.204830 kubelet[1956]: E0516 00:51:42.204815 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.204830 kubelet[1956]: W0516 00:51:42.204828 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.204908 kubelet[1956]: E0516 00:51:42.204839 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.204996 kubelet[1956]: E0516 00:51:42.204982 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.204996 kubelet[1956]: W0516 00:51:42.204994 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.205054 kubelet[1956]: E0516 00:51:42.205004 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.205307 kubelet[1956]: E0516 00:51:42.205291 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.205341 kubelet[1956]: W0516 00:51:42.205307 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.205398 kubelet[1956]: E0516 00:51:42.205384 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.205458 kubelet[1956]: E0516 00:51:42.205443 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.205492 kubelet[1956]: W0516 00:51:42.205458 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.205539 kubelet[1956]: E0516 00:51:42.205527 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.205602 kubelet[1956]: E0516 00:51:42.205585 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.205640 kubelet[1956]: W0516 00:51:42.205602 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.205712 kubelet[1956]: E0516 00:51:42.205696 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.205943 kubelet[1956]: E0516 00:51:42.205928 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.205993 kubelet[1956]: W0516 00:51:42.205944 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.205993 kubelet[1956]: E0516 00:51:42.205980 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.206144 kubelet[1956]: E0516 00:51:42.206132 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.206144 kubelet[1956]: W0516 00:51:42.206144 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.206200 kubelet[1956]: E0516 00:51:42.206173 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.206316 kubelet[1956]: E0516 00:51:42.206304 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.206345 kubelet[1956]: W0516 00:51:42.206319 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.206345 kubelet[1956]: E0516 00:51:42.206333 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.206525 kubelet[1956]: E0516 00:51:42.206512 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.206525 kubelet[1956]: W0516 00:51:42.206523 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.206591 kubelet[1956]: E0516 00:51:42.206536 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.206742 kubelet[1956]: E0516 00:51:42.206729 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.206774 kubelet[1956]: W0516 00:51:42.206742 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.206774 kubelet[1956]: E0516 00:51:42.206752 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.206960 kubelet[1956]: E0516 00:51:42.206946 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.207004 kubelet[1956]: W0516 00:51:42.206960 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.207004 kubelet[1956]: E0516 00:51:42.206976 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.207352 kubelet[1956]: E0516 00:51:42.207337 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.207352 kubelet[1956]: W0516 00:51:42.207351 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.207410 kubelet[1956]: E0516 00:51:42.207361 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.219227 kubelet[1956]: E0516 00:51:42.219196 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:42.219227 kubelet[1956]: W0516 00:51:42.219212 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:42.219227 kubelet[1956]: E0516 00:51:42.219226 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:42.502536 systemd[1]: run-containerd-runc-k8s.io-cbef143b7189b8c9bb574b2fe1107b8f2a5a2540e305f55842e951de1b5c1f14-runc.T1o6KC.mount: Deactivated successfully. May 16 00:51:42.782635 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2554639985.mount: Deactivated successfully. May 16 00:51:43.277883 kubelet[1956]: E0516 00:51:43.277429 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfrqm" podUID="561a2113-fd27-44d9-9df0-c2cfce17e3bf" May 16 00:51:43.579471 env[1213]: time="2025-05-16T00:51:43.579425483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:43.580723 env[1213]: time="2025-05-16T00:51:43.580689505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:43.581978 env[1213]: time="2025-05-16T00:51:43.581946086Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:43.583253 env[1213]: time="2025-05-16T00:51:43.583225229Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:43.584297 env[1213]: time="2025-05-16T00:51:43.584261319Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb\"" May 16 00:51:43.590153 env[1213]: time="2025-05-16T00:51:43.587782492Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 16 00:51:43.602509 env[1213]: time="2025-05-16T00:51:43.602478491Z" level=info msg="CreateContainer within sandbox \"cbef143b7189b8c9bb574b2fe1107b8f2a5a2540e305f55842e951de1b5c1f14\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 16 00:51:43.614283 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount389154150.mount: Deactivated successfully. May 16 00:51:43.615171 env[1213]: time="2025-05-16T00:51:43.615129551Z" level=info msg="CreateContainer within sandbox \"cbef143b7189b8c9bb574b2fe1107b8f2a5a2540e305f55842e951de1b5c1f14\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b79819148cab52fe10beafea4fbd5d63b214d6ccf337129e1661952040147341\"" May 16 00:51:43.615583 env[1213]: time="2025-05-16T00:51:43.615560452Z" level=info msg="StartContainer for \"b79819148cab52fe10beafea4fbd5d63b214d6ccf337129e1661952040147341\"" May 16 00:51:43.633601 systemd[1]: Started cri-containerd-b79819148cab52fe10beafea4fbd5d63b214d6ccf337129e1661952040147341.scope. May 16 00:51:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.670168 kernel: kauditd_printk_skb: 139 callbacks suppressed May 16 00:51:43.670226 kernel: audit: type=1400 audit(1747356703.667:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673786 kernel: audit: type=1400 audit(1747356703.667:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673846 kernel: audit: type=1400 audit(1747356703.667:975): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675636 kernel: audit: type=1400 audit(1747356703.667:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.677401 kernel: audit: type=1400 audit(1747356703.667:977): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.679206 kernel: audit: type=1400 audit(1747356703.667:978): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.680979 kernel: audit: type=1400 audit(1747356703.667:979): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.682714 kernel: audit: type=1400 audit(1747356703.667:980): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.684505 kernel: audit: type=1400 audit(1747356703.667:981): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.690014 kernel: audit: type=1400 audit(1747356703.668:982): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.668000 audit: BPF prog-id=126 op=LOAD May 16 00:51:43.672000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2379 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:43.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237393831393134386361623532666531306265616665613466626435 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2379 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:43.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237393831393134386361623532666531306265616665613466626435 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.672000 audit: BPF prog-id=127 op=LOAD May 16 00:51:43.672000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2379 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:43.672000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237393831393134386361623532666531306265616665613466626435 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.673000 audit: BPF prog-id=128 op=LOAD May 16 00:51:43.673000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2379 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:43.673000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237393831393134386361623532666531306265616665613466626435 May 16 00:51:43.675000 audit: BPF prog-id=128 op=UNLOAD May 16 00:51:43.675000 audit: BPF prog-id=127 op=UNLOAD May 16 00:51:43.675000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { perfmon } for pid=2532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit[2532]: AVC avc: denied { bpf } for pid=2532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:43.675000 audit: BPF prog-id=129 op=LOAD May 16 00:51:43.675000 audit[2532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2379 pid=2532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:43.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237393831393134386361623532666531306265616665613466626435 May 16 00:51:43.718588 env[1213]: time="2025-05-16T00:51:43.718539014Z" level=info msg="StartContainer for \"b79819148cab52fe10beafea4fbd5d63b214d6ccf337129e1661952040147341\" returns successfully" May 16 00:51:44.329797 kubelet[1956]: E0516 00:51:44.329696 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:44.348628 kubelet[1956]: I0516 00:51:44.348287 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7db5ff58c7-r728g" podStartSLOduration=1.536519206 podStartE2EDuration="3.348270707s" podCreationTimestamp="2025-05-16 00:51:41 +0000 UTC" firstStartedPulling="2025-05-16 00:51:41.774871974 +0000 UTC m=+19.593995238" lastFinishedPulling="2025-05-16 00:51:43.586623475 +0000 UTC m=+21.405746739" observedRunningTime="2025-05-16 00:51:44.347959613 +0000 UTC m=+22.167082917" watchObservedRunningTime="2025-05-16 00:51:44.348270707 +0000 UTC m=+22.167393971" May 16 00:51:44.415327 kubelet[1956]: E0516 00:51:44.415301 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.415492 kubelet[1956]: W0516 00:51:44.415475 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.415564 kubelet[1956]: E0516 00:51:44.415549 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.415847 kubelet[1956]: E0516 00:51:44.415833 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.415957 kubelet[1956]: W0516 00:51:44.415944 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.416024 kubelet[1956]: E0516 00:51:44.416013 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.416242 kubelet[1956]: E0516 00:51:44.416228 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.416327 kubelet[1956]: W0516 00:51:44.416313 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.416408 kubelet[1956]: E0516 00:51:44.416372 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.416635 kubelet[1956]: E0516 00:51:44.416622 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.416704 kubelet[1956]: W0516 00:51:44.416692 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.416780 kubelet[1956]: E0516 00:51:44.416768 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.417058 kubelet[1956]: E0516 00:51:44.417045 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.417149 kubelet[1956]: W0516 00:51:44.417136 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.417210 kubelet[1956]: E0516 00:51:44.417198 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.417430 kubelet[1956]: E0516 00:51:44.417417 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.417510 kubelet[1956]: W0516 00:51:44.417497 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.417571 kubelet[1956]: E0516 00:51:44.417559 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.417788 kubelet[1956]: E0516 00:51:44.417775 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.417885 kubelet[1956]: W0516 00:51:44.417871 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.417943 kubelet[1956]: E0516 00:51:44.417932 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.418168 kubelet[1956]: E0516 00:51:44.418155 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.418238 kubelet[1956]: W0516 00:51:44.418225 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.418305 kubelet[1956]: E0516 00:51:44.418294 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.418528 kubelet[1956]: E0516 00:51:44.418516 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.418604 kubelet[1956]: W0516 00:51:44.418593 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.418659 kubelet[1956]: E0516 00:51:44.418649 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.418891 kubelet[1956]: E0516 00:51:44.418878 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.418973 kubelet[1956]: W0516 00:51:44.418961 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.419038 kubelet[1956]: E0516 00:51:44.419027 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.419250 kubelet[1956]: E0516 00:51:44.419238 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.419325 kubelet[1956]: W0516 00:51:44.419312 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.419392 kubelet[1956]: E0516 00:51:44.419379 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.419604 kubelet[1956]: E0516 00:51:44.419592 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.419680 kubelet[1956]: W0516 00:51:44.419667 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.419753 kubelet[1956]: E0516 00:51:44.419740 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.420000 kubelet[1956]: E0516 00:51:44.419988 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.420084 kubelet[1956]: W0516 00:51:44.420072 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.420145 kubelet[1956]: E0516 00:51:44.420133 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.420335 kubelet[1956]: E0516 00:51:44.420323 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.420409 kubelet[1956]: W0516 00:51:44.420397 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.420467 kubelet[1956]: E0516 00:51:44.420455 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.420659 kubelet[1956]: E0516 00:51:44.420647 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.420725 kubelet[1956]: W0516 00:51:44.420714 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.420803 kubelet[1956]: E0516 00:51:44.420790 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.421101 kubelet[1956]: E0516 00:51:44.421088 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.421188 kubelet[1956]: W0516 00:51:44.421175 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.421249 kubelet[1956]: E0516 00:51:44.421238 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.421476 kubelet[1956]: E0516 00:51:44.421464 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.421555 kubelet[1956]: W0516 00:51:44.421542 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.421629 kubelet[1956]: E0516 00:51:44.421617 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.421912 kubelet[1956]: E0516 00:51:44.421842 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.421912 kubelet[1956]: W0516 00:51:44.421872 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.421912 kubelet[1956]: E0516 00:51:44.421892 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.422063 kubelet[1956]: E0516 00:51:44.422051 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.422100 kubelet[1956]: W0516 00:51:44.422061 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.422100 kubelet[1956]: E0516 00:51:44.422080 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.422231 kubelet[1956]: E0516 00:51:44.422221 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.422231 kubelet[1956]: W0516 00:51:44.422231 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.422288 kubelet[1956]: E0516 00:51:44.422243 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.422402 kubelet[1956]: E0516 00:51:44.422390 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.422402 kubelet[1956]: W0516 00:51:44.422400 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.422467 kubelet[1956]: E0516 00:51:44.422412 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.422678 kubelet[1956]: E0516 00:51:44.422664 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.422764 kubelet[1956]: W0516 00:51:44.422751 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.422829 kubelet[1956]: E0516 00:51:44.422817 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.423008 kubelet[1956]: E0516 00:51:44.422993 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.423008 kubelet[1956]: W0516 00:51:44.423005 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.423087 kubelet[1956]: E0516 00:51:44.423022 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.423214 kubelet[1956]: E0516 00:51:44.423194 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.423214 kubelet[1956]: W0516 00:51:44.423213 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.423282 kubelet[1956]: E0516 00:51:44.423230 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.423391 kubelet[1956]: E0516 00:51:44.423380 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.423391 kubelet[1956]: W0516 00:51:44.423390 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.423456 kubelet[1956]: E0516 00:51:44.423403 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.423552 kubelet[1956]: E0516 00:51:44.423541 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.423552 kubelet[1956]: W0516 00:51:44.423550 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.423608 kubelet[1956]: E0516 00:51:44.423563 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.423694 kubelet[1956]: E0516 00:51:44.423683 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.423694 kubelet[1956]: W0516 00:51:44.423692 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.423771 kubelet[1956]: E0516 00:51:44.423704 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.423918 kubelet[1956]: E0516 00:51:44.423877 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.423918 kubelet[1956]: W0516 00:51:44.423887 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.423918 kubelet[1956]: E0516 00:51:44.423899 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.424212 kubelet[1956]: E0516 00:51:44.424199 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.424288 kubelet[1956]: W0516 00:51:44.424276 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.424366 kubelet[1956]: E0516 00:51:44.424354 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.424529 kubelet[1956]: E0516 00:51:44.424513 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.424529 kubelet[1956]: W0516 00:51:44.424527 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.424596 kubelet[1956]: E0516 00:51:44.424549 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.424703 kubelet[1956]: E0516 00:51:44.424691 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.424703 kubelet[1956]: W0516 00:51:44.424701 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.424776 kubelet[1956]: E0516 00:51:44.424709 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.424903 kubelet[1956]: E0516 00:51:44.424892 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.424903 kubelet[1956]: W0516 00:51:44.424903 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.424964 kubelet[1956]: E0516 00:51:44.424912 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.425195 kubelet[1956]: E0516 00:51:44.425172 1956 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:51:44.425195 kubelet[1956]: W0516 00:51:44.425185 1956 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:51:44.425250 kubelet[1956]: E0516 00:51:44.425197 1956 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:51:44.809067 env[1213]: time="2025-05-16T00:51:44.809030058Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:44.811748 env[1213]: time="2025-05-16T00:51:44.811722381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:44.812911 env[1213]: time="2025-05-16T00:51:44.812886635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:44.814102 env[1213]: time="2025-05-16T00:51:44.814072009Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:44.814543 env[1213]: time="2025-05-16T00:51:44.814517069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 16 00:51:44.818311 env[1213]: time="2025-05-16T00:51:44.817935146Z" level=info msg="CreateContainer within sandbox \"69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 16 00:51:44.841614 env[1213]: time="2025-05-16T00:51:44.841565271Z" level=info msg="CreateContainer within sandbox \"69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997\"" May 16 00:51:44.842267 env[1213]: time="2025-05-16T00:51:44.842229062Z" level=info msg="StartContainer for \"0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997\"" May 16 00:51:44.862430 systemd[1]: Started cri-containerd-0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997.scope. May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2426 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:44.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623664393664363466646339653435656631313638333631343231 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit: BPF prog-id=130 op=LOAD May 16 00:51:44.897000 audit[2607]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2426 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:44.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623664393664363466646339653435656631313638333631343231 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit: BPF prog-id=131 op=LOAD May 16 00:51:44.897000 audit[2607]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2426 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:44.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623664393664363466646339653435656631313638333631343231 May 16 00:51:44.897000 audit: BPF prog-id=131 op=UNLOAD May 16 00:51:44.897000 audit: BPF prog-id=130 op=UNLOAD May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { perfmon } for pid=2607 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit[2607]: AVC avc: denied { bpf } for pid=2607 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:44.897000 audit: BPF prog-id=132 op=LOAD May 16 00:51:44.897000 audit[2607]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2426 pid=2607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:44.897000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065623664393664363466646339653435656631313638333631343231 May 16 00:51:44.911621 env[1213]: time="2025-05-16T00:51:44.911576445Z" level=info msg="StartContainer for \"0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997\" returns successfully" May 16 00:51:44.929308 systemd[1]: cri-containerd-0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997.scope: Deactivated successfully. May 16 00:51:44.935000 audit: BPF prog-id=132 op=UNLOAD May 16 00:51:44.961793 env[1213]: time="2025-05-16T00:51:44.961723387Z" level=info msg="shim disconnected" id=0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997 May 16 00:51:44.961793 env[1213]: time="2025-05-16T00:51:44.961787030Z" level=warning msg="cleaning up after shim disconnected" id=0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997 namespace=k8s.io May 16 00:51:44.961793 env[1213]: time="2025-05-16T00:51:44.961798790Z" level=info msg="cleaning up dead shim" May 16 00:51:44.968745 env[1213]: time="2025-05-16T00:51:44.968705347Z" level=warning msg="cleanup warnings time=\"2025-05-16T00:51:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2645 runtime=io.containerd.runc.v2\n" May 16 00:51:45.277784 kubelet[1956]: E0516 00:51:45.277654 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfrqm" podUID="561a2113-fd27-44d9-9df0-c2cfce17e3bf" May 16 00:51:45.332803 kubelet[1956]: I0516 00:51:45.332636 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:51:45.333124 kubelet[1956]: E0516 00:51:45.332924 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:45.333353 env[1213]: time="2025-05-16T00:51:45.333320452Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 16 00:51:45.595451 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0eb6d96d64fdc9e45ef1168361421042a8219abfe07178868788f7132d461997-rootfs.mount: Deactivated successfully. May 16 00:51:47.286094 kubelet[1956]: E0516 00:51:47.286038 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vfrqm" podUID="561a2113-fd27-44d9-9df0-c2cfce17e3bf" May 16 00:51:47.989678 env[1213]: time="2025-05-16T00:51:47.989622282Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:47.990898 env[1213]: time="2025-05-16T00:51:47.990847448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:47.992368 env[1213]: time="2025-05-16T00:51:47.992333025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:47.993771 env[1213]: time="2025-05-16T00:51:47.993739878Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:47.994237 env[1213]: time="2025-05-16T00:51:47.994209536Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 16 00:51:47.996666 env[1213]: time="2025-05-16T00:51:47.996493902Z" level=info msg="CreateContainer within sandbox \"69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 16 00:51:48.010057 env[1213]: time="2025-05-16T00:51:48.010005911Z" level=info msg="CreateContainer within sandbox \"69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc\"" May 16 00:51:48.010401 env[1213]: time="2025-05-16T00:51:48.010371124Z" level=info msg="StartContainer for \"8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc\"" May 16 00:51:48.029928 systemd[1]: run-containerd-runc-k8s.io-8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc-runc.dmluWc.mount: Deactivated successfully. May 16 00:51:48.031528 systemd[1]: Started cri-containerd-8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc.scope. May 16 00:51:48.071000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2426 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:48.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393939666666353830653331386134313135663235633964373466 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.071000 audit: BPF prog-id=133 op=LOAD May 16 00:51:48.071000 audit[2673]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2426 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:48.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393939666666353830653331386134313135663235633964373466 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit: BPF prog-id=134 op=LOAD May 16 00:51:48.072000 audit[2673]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2426 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:48.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393939666666353830653331386134313135663235633964373466 May 16 00:51:48.072000 audit: BPF prog-id=134 op=UNLOAD May 16 00:51:48.072000 audit: BPF prog-id=133 op=UNLOAD May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { perfmon } for pid=2673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit[2673]: AVC avc: denied { bpf } for pid=2673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:48.072000 audit: BPF prog-id=135 op=LOAD May 16 00:51:48.072000 audit[2673]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2426 pid=2673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:48.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865393939666666353830653331386134313135663235633964373466 May 16 00:51:48.085726 env[1213]: time="2025-05-16T00:51:48.085689715Z" level=info msg="StartContainer for \"8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc\" returns successfully" May 16 00:51:48.802388 env[1213]: time="2025-05-16T00:51:48.802337047Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 16 00:51:48.804366 systemd[1]: cri-containerd-8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc.scope: Deactivated successfully. May 16 00:51:48.811460 kernel: kauditd_printk_skb: 134 callbacks suppressed May 16 00:51:48.811552 kernel: audit: type=1334 audit(1747356708.809:1004): prog-id=135 op=UNLOAD May 16 00:51:48.809000 audit: BPF prog-id=135 op=UNLOAD May 16 00:51:48.829180 env[1213]: time="2025-05-16T00:51:48.829140357Z" level=info msg="shim disconnected" id=8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc May 16 00:51:48.829370 env[1213]: time="2025-05-16T00:51:48.829351845Z" level=warning msg="cleaning up after shim disconnected" id=8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc namespace=k8s.io May 16 00:51:48.829430 env[1213]: time="2025-05-16T00:51:48.829418167Z" level=info msg="cleaning up dead shim" May 16 00:51:48.835580 env[1213]: time="2025-05-16T00:51:48.835550025Z" level=warning msg="cleanup warnings time=\"2025-05-16T00:51:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2712 runtime=io.containerd.runc.v2\n" May 16 00:51:48.898225 kubelet[1956]: I0516 00:51:48.898192 1956 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 16 00:51:48.926049 kubelet[1956]: W0516 00:51:48.926011 1956 reflector.go:561] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:localhost" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'localhost' and this object May 16 00:51:48.928603 kubelet[1956]: W0516 00:51:48.928454 1956 reflector.go:561] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:localhost" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'localhost' and this object May 16 00:51:48.934903 kubelet[1956]: E0516 00:51:48.934867 1956 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"calico-apiserver-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"calico-apiserver-certs\" is forbidden: User \"system:node:localhost\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 16 00:51:48.934903 kubelet[1956]: E0516 00:51:48.934894 1956 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:localhost\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'localhost' and this object" logger="UnhandledError" May 16 00:51:48.939307 systemd[1]: Created slice kubepods-burstable-pod8d4db442_957c_4bac_a386_8c53068d9f22.slice. May 16 00:51:48.951646 systemd[1]: Created slice kubepods-besteffort-pod14889221_6fbd_4a5c_ae89_57afe5cc81db.slice. May 16 00:51:48.956382 systemd[1]: Created slice kubepods-besteffort-podd775377f_1cc8_46ad_b81c_271daff33eaa.slice. May 16 00:51:48.960370 systemd[1]: Created slice kubepods-burstable-pod1eea67e7_3525_474d_90c3_d26f6070b8be.slice. May 16 00:51:48.966100 systemd[1]: Created slice kubepods-besteffort-pod27be83d2_fa6b_49b6_be11_287306bf01df.slice. May 16 00:51:48.973959 systemd[1]: Created slice kubepods-besteffort-pod453d674a_7ed1_42ce_af47_5432d13a4ef8.slice. May 16 00:51:48.975897 systemd[1]: Created slice kubepods-besteffort-pod5c0163ae_4ad6_4e9f_8ad8_175069a920ab.slice. May 16 00:51:49.006443 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8e999fff580e318a4115f25c9d74fd1451567e3ae278b17fb3aea4732adbf7dc-rootfs.mount: Deactivated successfully. May 16 00:51:49.057434 kubelet[1956]: I0516 00:51:49.057315 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kl5td\" (UniqueName: \"kubernetes.io/projected/d775377f-1cc8-46ad-b81c-271daff33eaa-kube-api-access-kl5td\") pod \"calico-kube-controllers-69c567c48b-pl9jq\" (UID: \"d775377f-1cc8-46ad-b81c-271daff33eaa\") " pod="calico-system/calico-kube-controllers-69c567c48b-pl9jq" May 16 00:51:49.057434 kubelet[1956]: I0516 00:51:49.057372 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/453d674a-7ed1-42ce-af47-5432d13a4ef8-config\") pod \"goldmane-8f77d7b6c-p45jg\" (UID: \"453d674a-7ed1-42ce-af47-5432d13a4ef8\") " pod="calico-system/goldmane-8f77d7b6c-p45jg" May 16 00:51:49.058021 kubelet[1956]: I0516 00:51:49.057421 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5c0163ae-4ad6-4e9f-8ad8-175069a920ab-calico-apiserver-certs\") pod \"calico-apiserver-5b48879cf9-tgdhl\" (UID: \"5c0163ae-4ad6-4e9f-8ad8-175069a920ab\") " pod="calico-apiserver/calico-apiserver-5b48879cf9-tgdhl" May 16 00:51:49.058083 kubelet[1956]: I0516 00:51:49.058034 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8d4db442-957c-4bac-a386-8c53068d9f22-config-volume\") pod \"coredns-7c65d6cfc9-5kxv9\" (UID: \"8d4db442-957c-4bac-a386-8c53068d9f22\") " pod="kube-system/coredns-7c65d6cfc9-5kxv9" May 16 00:51:49.058083 kubelet[1956]: I0516 00:51:49.058057 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w5ctr\" (UniqueName: \"kubernetes.io/projected/1eea67e7-3525-474d-90c3-d26f6070b8be-kube-api-access-w5ctr\") pod \"coredns-7c65d6cfc9-mxsmq\" (UID: \"1eea67e7-3525-474d-90c3-d26f6070b8be\") " pod="kube-system/coredns-7c65d6cfc9-mxsmq" May 16 00:51:49.058083 kubelet[1956]: I0516 00:51:49.058078 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9rj7p\" (UniqueName: \"kubernetes.io/projected/27be83d2-fa6b-49b6-be11-287306bf01df-kube-api-access-9rj7p\") pod \"whisker-699f56df8b-n4lw7\" (UID: \"27be83d2-fa6b-49b6-be11-287306bf01df\") " pod="calico-system/whisker-699f56df8b-n4lw7" May 16 00:51:49.058173 kubelet[1956]: I0516 00:51:49.058095 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d775377f-1cc8-46ad-b81c-271daff33eaa-tigera-ca-bundle\") pod \"calico-kube-controllers-69c567c48b-pl9jq\" (UID: \"d775377f-1cc8-46ad-b81c-271daff33eaa\") " pod="calico-system/calico-kube-controllers-69c567c48b-pl9jq" May 16 00:51:49.058173 kubelet[1956]: I0516 00:51:49.058120 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1eea67e7-3525-474d-90c3-d26f6070b8be-config-volume\") pod \"coredns-7c65d6cfc9-mxsmq\" (UID: \"1eea67e7-3525-474d-90c3-d26f6070b8be\") " pod="kube-system/coredns-7c65d6cfc9-mxsmq" May 16 00:51:49.058173 kubelet[1956]: I0516 00:51:49.058141 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6fbkg\" (UniqueName: \"kubernetes.io/projected/14889221-6fbd-4a5c-ae89-57afe5cc81db-kube-api-access-6fbkg\") pod \"calico-apiserver-5b48879cf9-mrx99\" (UID: \"14889221-6fbd-4a5c-ae89-57afe5cc81db\") " pod="calico-apiserver/calico-apiserver-5b48879cf9-mrx99" May 16 00:51:49.058173 kubelet[1956]: I0516 00:51:49.058156 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/453d674a-7ed1-42ce-af47-5432d13a4ef8-goldmane-key-pair\") pod \"goldmane-8f77d7b6c-p45jg\" (UID: \"453d674a-7ed1-42ce-af47-5432d13a4ef8\") " pod="calico-system/goldmane-8f77d7b6c-p45jg" May 16 00:51:49.058173 kubelet[1956]: I0516 00:51:49.058172 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zrxw5\" (UniqueName: \"kubernetes.io/projected/5c0163ae-4ad6-4e9f-8ad8-175069a920ab-kube-api-access-zrxw5\") pod \"calico-apiserver-5b48879cf9-tgdhl\" (UID: \"5c0163ae-4ad6-4e9f-8ad8-175069a920ab\") " pod="calico-apiserver/calico-apiserver-5b48879cf9-tgdhl" May 16 00:51:49.058289 kubelet[1956]: I0516 00:51:49.058212 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j2fc2\" (UniqueName: \"kubernetes.io/projected/8d4db442-957c-4bac-a386-8c53068d9f22-kube-api-access-j2fc2\") pod \"coredns-7c65d6cfc9-5kxv9\" (UID: \"8d4db442-957c-4bac-a386-8c53068d9f22\") " pod="kube-system/coredns-7c65d6cfc9-5kxv9" May 16 00:51:49.058289 kubelet[1956]: I0516 00:51:49.058272 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/453d674a-7ed1-42ce-af47-5432d13a4ef8-goldmane-ca-bundle\") pod \"goldmane-8f77d7b6c-p45jg\" (UID: \"453d674a-7ed1-42ce-af47-5432d13a4ef8\") " pod="calico-system/goldmane-8f77d7b6c-p45jg" May 16 00:51:49.058337 kubelet[1956]: I0516 00:51:49.058325 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/14889221-6fbd-4a5c-ae89-57afe5cc81db-calico-apiserver-certs\") pod \"calico-apiserver-5b48879cf9-mrx99\" (UID: \"14889221-6fbd-4a5c-ae89-57afe5cc81db\") " pod="calico-apiserver/calico-apiserver-5b48879cf9-mrx99" May 16 00:51:49.058364 kubelet[1956]: I0516 00:51:49.058347 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-ca-bundle\") pod \"whisker-699f56df8b-n4lw7\" (UID: \"27be83d2-fa6b-49b6-be11-287306bf01df\") " pod="calico-system/whisker-699f56df8b-n4lw7" May 16 00:51:49.058413 kubelet[1956]: I0516 00:51:49.058370 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zbxj6\" (UniqueName: \"kubernetes.io/projected/453d674a-7ed1-42ce-af47-5432d13a4ef8-kube-api-access-zbxj6\") pod \"goldmane-8f77d7b6c-p45jg\" (UID: \"453d674a-7ed1-42ce-af47-5432d13a4ef8\") " pod="calico-system/goldmane-8f77d7b6c-p45jg" May 16 00:51:49.058453 kubelet[1956]: I0516 00:51:49.058416 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-backend-key-pair\") pod \"whisker-699f56df8b-n4lw7\" (UID: \"27be83d2-fa6b-49b6-be11-287306bf01df\") " pod="calico-system/whisker-699f56df8b-n4lw7" May 16 00:51:49.249506 kubelet[1956]: E0516 00:51:49.249458 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:49.250287 env[1213]: time="2025-05-16T00:51:49.250244297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5kxv9,Uid:8d4db442-957c-4bac-a386-8c53068d9f22,Namespace:kube-system,Attempt:0,}" May 16 00:51:49.258718 env[1213]: time="2025-05-16T00:51:49.258671057Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c567c48b-pl9jq,Uid:d775377f-1cc8-46ad-b81c-271daff33eaa,Namespace:calico-system,Attempt:0,}" May 16 00:51:49.264548 kubelet[1956]: E0516 00:51:49.264509 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:51:49.265433 env[1213]: time="2025-05-16T00:51:49.265393920Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-mxsmq,Uid:1eea67e7-3525-474d-90c3-d26f6070b8be,Namespace:kube-system,Attempt:0,}" May 16 00:51:49.273153 env[1213]: time="2025-05-16T00:51:49.273115657Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-699f56df8b-n4lw7,Uid:27be83d2-fa6b-49b6-be11-287306bf01df,Namespace:calico-system,Attempt:0,}" May 16 00:51:49.281693 env[1213]: time="2025-05-16T00:51:49.281648741Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-p45jg,Uid:453d674a-7ed1-42ce-af47-5432d13a4ef8,Namespace:calico-system,Attempt:0,}" May 16 00:51:49.302999 systemd[1]: Created slice kubepods-besteffort-pod561a2113_fd27_44d9_9df0_c2cfce17e3bf.slice. May 16 00:51:49.320618 env[1213]: time="2025-05-16T00:51:49.320522713Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfrqm,Uid:561a2113-fd27-44d9-9df0-c2cfce17e3bf,Namespace:calico-system,Attempt:0,}" May 16 00:51:49.345813 env[1213]: time="2025-05-16T00:51:49.345770712Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 16 00:51:49.540489 env[1213]: time="2025-05-16T00:51:49.540405942Z" level=error msg="Failed to destroy network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.541708 env[1213]: time="2025-05-16T00:51:49.541658784Z" level=error msg="encountered an error cleaning up failed sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.541777 env[1213]: time="2025-05-16T00:51:49.541719146Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-mxsmq,Uid:1eea67e7-3525-474d-90c3-d26f6070b8be,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.542291 kubelet[1956]: E0516 00:51:49.541965 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.542291 kubelet[1956]: E0516 00:51:49.542028 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-mxsmq" May 16 00:51:49.542291 kubelet[1956]: E0516 00:51:49.542047 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-mxsmq" May 16 00:51:49.542419 kubelet[1956]: E0516 00:51:49.542090 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-mxsmq_kube-system(1eea67e7-3525-474d-90c3-d26f6070b8be)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-mxsmq_kube-system(1eea67e7-3525-474d-90c3-d26f6070b8be)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-mxsmq" podUID="1eea67e7-3525-474d-90c3-d26f6070b8be" May 16 00:51:49.547607 env[1213]: time="2025-05-16T00:51:49.547559580Z" level=error msg="Failed to destroy network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.547961 env[1213]: time="2025-05-16T00:51:49.547911912Z" level=error msg="encountered an error cleaning up failed sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.548015 env[1213]: time="2025-05-16T00:51:49.547973354Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5kxv9,Uid:8d4db442-957c-4bac-a386-8c53068d9f22,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.548450 kubelet[1956]: E0516 00:51:49.548140 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.548450 kubelet[1956]: E0516 00:51:49.548187 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-5kxv9" May 16 00:51:49.548450 kubelet[1956]: E0516 00:51:49.548205 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-5kxv9" May 16 00:51:49.548581 kubelet[1956]: E0516 00:51:49.548238 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-5kxv9_kube-system(8d4db442-957c-4bac-a386-8c53068d9f22)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-5kxv9_kube-system(8d4db442-957c-4bac-a386-8c53068d9f22)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-5kxv9" podUID="8d4db442-957c-4bac-a386-8c53068d9f22" May 16 00:51:49.556638 env[1213]: time="2025-05-16T00:51:49.556592961Z" level=error msg="Failed to destroy network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.557071 env[1213]: time="2025-05-16T00:51:49.557038695Z" level=error msg="encountered an error cleaning up failed sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.557210 env[1213]: time="2025-05-16T00:51:49.557180580Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-699f56df8b-n4lw7,Uid:27be83d2-fa6b-49b6-be11-287306bf01df,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.557517 kubelet[1956]: E0516 00:51:49.557477 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.557592 kubelet[1956]: E0516 00:51:49.557535 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-699f56df8b-n4lw7" May 16 00:51:49.557592 kubelet[1956]: E0516 00:51:49.557553 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-699f56df8b-n4lw7" May 16 00:51:49.559974 kubelet[1956]: E0516 00:51:49.557591 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-699f56df8b-n4lw7_calico-system(27be83d2-fa6b-49b6-be11-287306bf01df)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-699f56df8b-n4lw7_calico-system(27be83d2-fa6b-49b6-be11-287306bf01df)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-699f56df8b-n4lw7" podUID="27be83d2-fa6b-49b6-be11-287306bf01df" May 16 00:51:49.564971 env[1213]: time="2025-05-16T00:51:49.564920397Z" level=error msg="Failed to destroy network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.565328 env[1213]: time="2025-05-16T00:51:49.565280049Z" level=error msg="encountered an error cleaning up failed sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.565390 env[1213]: time="2025-05-16T00:51:49.565341411Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c567c48b-pl9jq,Uid:d775377f-1cc8-46ad-b81c-271daff33eaa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.565675 kubelet[1956]: E0516 00:51:49.565540 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.565675 kubelet[1956]: E0516 00:51:49.565582 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c567c48b-pl9jq" May 16 00:51:49.565981 kubelet[1956]: E0516 00:51:49.565601 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-69c567c48b-pl9jq" May 16 00:51:49.565981 kubelet[1956]: E0516 00:51:49.565781 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-69c567c48b-pl9jq_calico-system(d775377f-1cc8-46ad-b81c-271daff33eaa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-69c567c48b-pl9jq_calico-system(d775377f-1cc8-46ad-b81c-271daff33eaa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c567c48b-pl9jq" podUID="d775377f-1cc8-46ad-b81c-271daff33eaa" May 16 00:51:49.567325 env[1213]: time="2025-05-16T00:51:49.567228674Z" level=error msg="Failed to destroy network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.567717 env[1213]: time="2025-05-16T00:51:49.567684489Z" level=error msg="encountered an error cleaning up failed sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.567831 env[1213]: time="2025-05-16T00:51:49.567805693Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfrqm,Uid:561a2113-fd27-44d9-9df0-c2cfce17e3bf,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.568407 kubelet[1956]: E0516 00:51:49.568235 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.568407 kubelet[1956]: E0516 00:51:49.568308 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vfrqm" May 16 00:51:49.568407 kubelet[1956]: E0516 00:51:49.568332 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vfrqm" May 16 00:51:49.569333 kubelet[1956]: E0516 00:51:49.568362 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vfrqm_calico-system(561a2113-fd27-44d9-9df0-c2cfce17e3bf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vfrqm_calico-system(561a2113-fd27-44d9-9df0-c2cfce17e3bf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vfrqm" podUID="561a2113-fd27-44d9-9df0-c2cfce17e3bf" May 16 00:51:49.571651 env[1213]: time="2025-05-16T00:51:49.571564058Z" level=error msg="Failed to destroy network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.572821 env[1213]: time="2025-05-16T00:51:49.572775539Z" level=error msg="encountered an error cleaning up failed sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.572963 env[1213]: time="2025-05-16T00:51:49.572825780Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-p45jg,Uid:453d674a-7ed1-42ce-af47-5432d13a4ef8,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.573052 kubelet[1956]: E0516 00:51:49.573019 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:49.573096 kubelet[1956]: E0516 00:51:49.573064 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-p45jg" May 16 00:51:49.573096 kubelet[1956]: E0516 00:51:49.573081 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-p45jg" May 16 00:51:49.573159 kubelet[1956]: E0516 00:51:49.573117 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-8f77d7b6c-p45jg_calico-system(453d674a-7ed1-42ce-af47-5432d13a4ef8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-8f77d7b6c-p45jg_calico-system(453d674a-7ed1-42ce-af47-5432d13a4ef8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:51:50.178166 kubelet[1956]: E0516 00:51:50.178102 1956 projected.go:288] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 16 00:51:50.178166 kubelet[1956]: E0516 00:51:50.178149 1956 projected.go:194] Error preparing data for projected volume kube-api-access-6fbkg for pod calico-apiserver/calico-apiserver-5b48879cf9-mrx99: failed to sync configmap cache: timed out waiting for the condition May 16 00:51:50.179263 kubelet[1956]: E0516 00:51:50.178239 1956 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/14889221-6fbd-4a5c-ae89-57afe5cc81db-kube-api-access-6fbkg podName:14889221-6fbd-4a5c-ae89-57afe5cc81db nodeName:}" failed. No retries permitted until 2025-05-16 00:51:50.678210217 +0000 UTC m=+28.497333481 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-6fbkg" (UniqueName: "kubernetes.io/projected/14889221-6fbd-4a5c-ae89-57afe5cc81db-kube-api-access-6fbkg") pod "calico-apiserver-5b48879cf9-mrx99" (UID: "14889221-6fbd-4a5c-ae89-57afe5cc81db") : failed to sync configmap cache: timed out waiting for the condition May 16 00:51:50.181237 kubelet[1956]: E0516 00:51:50.181214 1956 projected.go:288] Couldn't get configMap calico-apiserver/kube-root-ca.crt: failed to sync configmap cache: timed out waiting for the condition May 16 00:51:50.181237 kubelet[1956]: E0516 00:51:50.181236 1956 projected.go:194] Error preparing data for projected volume kube-api-access-zrxw5 for pod calico-apiserver/calico-apiserver-5b48879cf9-tgdhl: failed to sync configmap cache: timed out waiting for the condition May 16 00:51:50.181344 kubelet[1956]: E0516 00:51:50.181274 1956 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/5c0163ae-4ad6-4e9f-8ad8-175069a920ab-kube-api-access-zrxw5 podName:5c0163ae-4ad6-4e9f-8ad8-175069a920ab nodeName:}" failed. No retries permitted until 2025-05-16 00:51:50.681262672 +0000 UTC m=+28.500385896 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-zrxw5" (UniqueName: "kubernetes.io/projected/5c0163ae-4ad6-4e9f-8ad8-175069a920ab-kube-api-access-zrxw5") pod "calico-apiserver-5b48879cf9-tgdhl" (UID: "5c0163ae-4ad6-4e9f-8ad8-175069a920ab") : failed to sync configmap cache: timed out waiting for the condition May 16 00:51:50.348287 kubelet[1956]: I0516 00:51:50.348258 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:51:50.349574 env[1213]: time="2025-05-16T00:51:50.349514995Z" level=info msg="StopPodSandbox for \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\"" May 16 00:51:50.350571 kubelet[1956]: I0516 00:51:50.350549 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:51:50.351134 env[1213]: time="2025-05-16T00:51:50.351103405Z" level=info msg="StopPodSandbox for \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\"" May 16 00:51:50.352780 kubelet[1956]: I0516 00:51:50.352758 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:51:50.353275 env[1213]: time="2025-05-16T00:51:50.353241751Z" level=info msg="StopPodSandbox for \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\"" May 16 00:51:50.354514 kubelet[1956]: I0516 00:51:50.354491 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:51:50.355313 env[1213]: time="2025-05-16T00:51:50.355278535Z" level=info msg="StopPodSandbox for \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\"" May 16 00:51:50.356234 kubelet[1956]: I0516 00:51:50.356212 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:51:50.357149 kubelet[1956]: I0516 00:51:50.357130 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:51:50.357652 env[1213]: time="2025-05-16T00:51:50.357621888Z" level=info msg="StopPodSandbox for \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\"" May 16 00:51:50.358118 env[1213]: time="2025-05-16T00:51:50.358090063Z" level=info msg="StopPodSandbox for \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\"" May 16 00:51:50.395301 env[1213]: time="2025-05-16T00:51:50.395241660Z" level=error msg="StopPodSandbox for \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\" failed" error="failed to destroy network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:50.395724 kubelet[1956]: E0516 00:51:50.395552 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:51:50.395724 kubelet[1956]: E0516 00:51:50.395609 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578"} May 16 00:51:50.395724 kubelet[1956]: E0516 00:51:50.395664 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"561a2113-fd27-44d9-9df0-c2cfce17e3bf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:50.395724 kubelet[1956]: E0516 00:51:50.395685 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"561a2113-fd27-44d9-9df0-c2cfce17e3bf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vfrqm" podUID="561a2113-fd27-44d9-9df0-c2cfce17e3bf" May 16 00:51:50.402772 env[1213]: time="2025-05-16T00:51:50.402725854Z" level=error msg="StopPodSandbox for \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\" failed" error="failed to destroy network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:50.403202 kubelet[1956]: E0516 00:51:50.403059 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:51:50.403202 kubelet[1956]: E0516 00:51:50.403100 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73"} May 16 00:51:50.403202 kubelet[1956]: E0516 00:51:50.403134 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8d4db442-957c-4bac-a386-8c53068d9f22\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:50.403202 kubelet[1956]: E0516 00:51:50.403153 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8d4db442-957c-4bac-a386-8c53068d9f22\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-5kxv9" podUID="8d4db442-957c-4bac-a386-8c53068d9f22" May 16 00:51:50.406577 env[1213]: time="2025-05-16T00:51:50.406535412Z" level=error msg="StopPodSandbox for \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\" failed" error="failed to destroy network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:50.406904 kubelet[1956]: E0516 00:51:50.406776 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:51:50.406904 kubelet[1956]: E0516 00:51:50.406811 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0"} May 16 00:51:50.406904 kubelet[1956]: E0516 00:51:50.406838 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"453d674a-7ed1-42ce-af47-5432d13a4ef8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:50.406904 kubelet[1956]: E0516 00:51:50.406870 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"453d674a-7ed1-42ce-af47-5432d13a4ef8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:51:50.416183 env[1213]: time="2025-05-16T00:51:50.416119631Z" level=error msg="StopPodSandbox for \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\" failed" error="failed to destroy network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:50.416497 kubelet[1956]: E0516 00:51:50.416362 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:51:50.416497 kubelet[1956]: E0516 00:51:50.416409 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9"} May 16 00:51:50.416497 kubelet[1956]: E0516 00:51:50.416436 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1eea67e7-3525-474d-90c3-d26f6070b8be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:50.416497 kubelet[1956]: E0516 00:51:50.416457 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1eea67e7-3525-474d-90c3-d26f6070b8be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-mxsmq" podUID="1eea67e7-3525-474d-90c3-d26f6070b8be" May 16 00:51:50.420586 env[1213]: time="2025-05-16T00:51:50.420530569Z" level=error msg="StopPodSandbox for \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\" failed" error="failed to destroy network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:50.420883 kubelet[1956]: E0516 00:51:50.420757 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:51:50.420883 kubelet[1956]: E0516 00:51:50.420790 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed"} May 16 00:51:50.420883 kubelet[1956]: E0516 00:51:50.420812 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d775377f-1cc8-46ad-b81c-271daff33eaa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:50.420883 kubelet[1956]: E0516 00:51:50.420835 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d775377f-1cc8-46ad-b81c-271daff33eaa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-69c567c48b-pl9jq" podUID="d775377f-1cc8-46ad-b81c-271daff33eaa" May 16 00:51:50.430977 env[1213]: time="2025-05-16T00:51:50.430870051Z" level=error msg="StopPodSandbox for \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\" failed" error="failed to destroy network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:50.431231 kubelet[1956]: E0516 00:51:50.431108 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:51:50.431231 kubelet[1956]: E0516 00:51:50.431140 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034"} May 16 00:51:50.431231 kubelet[1956]: E0516 00:51:50.431164 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"27be83d2-fa6b-49b6-be11-287306bf01df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:50.431231 kubelet[1956]: E0516 00:51:50.431185 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"27be83d2-fa6b-49b6-be11-287306bf01df\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-699f56df8b-n4lw7" podUID="27be83d2-fa6b-49b6-be11-287306bf01df" May 16 00:51:51.054711 env[1213]: time="2025-05-16T00:51:51.054653626Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-mrx99,Uid:14889221-6fbd-4a5c-ae89-57afe5cc81db,Namespace:calico-apiserver,Attempt:0,}" May 16 00:51:51.081340 env[1213]: time="2025-05-16T00:51:51.081294925Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-tgdhl,Uid:5c0163ae-4ad6-4e9f-8ad8-175069a920ab,Namespace:calico-apiserver,Attempt:0,}" May 16 00:51:51.130668 env[1213]: time="2025-05-16T00:51:51.130605926Z" level=error msg="Failed to destroy network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.132649 env[1213]: time="2025-05-16T00:51:51.130966776Z" level=error msg="encountered an error cleaning up failed sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.132649 env[1213]: time="2025-05-16T00:51:51.131031858Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-mrx99,Uid:14889221-6fbd-4a5c-ae89-57afe5cc81db,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.132745 kubelet[1956]: E0516 00:51:51.131251 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.132745 kubelet[1956]: E0516 00:51:51.131311 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b48879cf9-mrx99" May 16 00:51:51.132745 kubelet[1956]: E0516 00:51:51.131331 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b48879cf9-mrx99" May 16 00:51:51.132832 kubelet[1956]: E0516 00:51:51.131370 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5b48879cf9-mrx99_calico-apiserver(14889221-6fbd-4a5c-ae89-57afe5cc81db)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5b48879cf9-mrx99_calico-apiserver(14889221-6fbd-4a5c-ae89-57afe5cc81db)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b48879cf9-mrx99" podUID="14889221-6fbd-4a5c-ae89-57afe5cc81db" May 16 00:51:51.133986 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e-shm.mount: Deactivated successfully. May 16 00:51:51.156274 env[1213]: time="2025-05-16T00:51:51.156197633Z" level=error msg="Failed to destroy network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.156620 env[1213]: time="2025-05-16T00:51:51.156578564Z" level=error msg="encountered an error cleaning up failed sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.156665 env[1213]: time="2025-05-16T00:51:51.156632286Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-tgdhl,Uid:5c0163ae-4ad6-4e9f-8ad8-175069a920ab,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.156879 kubelet[1956]: E0516 00:51:51.156827 1956 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.156933 kubelet[1956]: E0516 00:51:51.156904 1956 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b48879cf9-tgdhl" May 16 00:51:51.156933 kubelet[1956]: E0516 00:51:51.156923 1956 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5b48879cf9-tgdhl" May 16 00:51:51.157018 kubelet[1956]: E0516 00:51:51.156964 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5b48879cf9-tgdhl_calico-apiserver(5c0163ae-4ad6-4e9f-8ad8-175069a920ab)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5b48879cf9-tgdhl_calico-apiserver(5c0163ae-4ad6-4e9f-8ad8-175069a920ab)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b48879cf9-tgdhl" podUID="5c0163ae-4ad6-4e9f-8ad8-175069a920ab" May 16 00:51:51.360418 kubelet[1956]: I0516 00:51:51.360174 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:51:51.361228 env[1213]: time="2025-05-16T00:51:51.361187543Z" level=info msg="StopPodSandbox for \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\"" May 16 00:51:51.365494 kubelet[1956]: I0516 00:51:51.365462 1956 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:51:51.371534 env[1213]: time="2025-05-16T00:51:51.365958322Z" level=info msg="StopPodSandbox for \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\"" May 16 00:51:51.407458 env[1213]: time="2025-05-16T00:51:51.407266009Z" level=error msg="StopPodSandbox for \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\" failed" error="failed to destroy network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.408189 kubelet[1956]: E0516 00:51:51.408138 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:51:51.408283 kubelet[1956]: E0516 00:51:51.408190 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977"} May 16 00:51:51.408283 kubelet[1956]: E0516 00:51:51.408232 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5c0163ae-4ad6-4e9f-8ad8-175069a920ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:51.408283 kubelet[1956]: E0516 00:51:51.408253 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5c0163ae-4ad6-4e9f-8ad8-175069a920ab\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b48879cf9-tgdhl" podUID="5c0163ae-4ad6-4e9f-8ad8-175069a920ab" May 16 00:51:51.417574 env[1213]: time="2025-05-16T00:51:51.416981853Z" level=error msg="StopPodSandbox for \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\" failed" error="failed to destroy network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:51:51.417820 kubelet[1956]: E0516 00:51:51.417769 1956 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:51:51.417883 kubelet[1956]: E0516 00:51:51.417829 1956 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e"} May 16 00:51:51.417883 kubelet[1956]: E0516 00:51:51.417876 1956 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"14889221-6fbd-4a5c-ae89-57afe5cc81db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:51:51.417971 kubelet[1956]: E0516 00:51:51.417898 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"14889221-6fbd-4a5c-ae89-57afe5cc81db\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5b48879cf9-mrx99" podUID="14889221-6fbd-4a5c-ae89-57afe5cc81db" May 16 00:51:52.067558 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977-shm.mount: Deactivated successfully. May 16 00:51:54.620269 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4292883065.mount: Deactivated successfully. May 16 00:51:54.823065 env[1213]: time="2025-05-16T00:51:54.823011057Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:54.824347 env[1213]: time="2025-05-16T00:51:54.824320448Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:54.825661 env[1213]: time="2025-05-16T00:51:54.825627920Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:54.827100 env[1213]: time="2025-05-16T00:51:54.827065114Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:51:54.827424 env[1213]: time="2025-05-16T00:51:54.827397242Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 16 00:51:54.840709 env[1213]: time="2025-05-16T00:51:54.840679962Z" level=info msg="CreateContainer within sandbox \"69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 16 00:51:54.852093 env[1213]: time="2025-05-16T00:51:54.851966354Z" level=info msg="CreateContainer within sandbox \"69652ab40609ac2e0717e823e792751a91132a023d52ee48f8511142d377a5c5\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6ee309482597e5e987856e4752ae9847512480e1106a59629b1bec0c3eff9ba9\"" May 16 00:51:54.852808 env[1213]: time="2025-05-16T00:51:54.852781573Z" level=info msg="StartContainer for \"6ee309482597e5e987856e4752ae9847512480e1106a59629b1bec0c3eff9ba9\"" May 16 00:51:54.872225 systemd[1]: Started cri-containerd-6ee309482597e5e987856e4752ae9847512480e1106a59629b1bec0c3eff9ba9.scope. May 16 00:51:54.893000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.893000 audit[3154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2426 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:54.899333 kernel: audit: type=1400 audit(1747356714.893:1005): avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.899397 kernel: audit: type=1300 audit(1747356714.893:1005): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2426 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:54.899427 kernel: audit: type=1327 audit(1747356714.893:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653330393438323539376535653938373835366534373532616539 May 16 00:51:54.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653330393438323539376535653938373835366534373532616539 May 16 00:51:54.901730 kernel: audit: type=1400 audit(1747356714.895:1006): avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.903425 kernel: audit: type=1400 audit(1747356714.895:1006): avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.906988 kernel: audit: type=1400 audit(1747356714.895:1006): avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.909331 kernel: audit: type=1400 audit(1747356714.895:1006): avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.909427 kernel: audit: type=1400 audit(1747356714.895:1006): avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.912964 kernel: audit: type=1400 audit(1747356714.895:1006): avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.913031 kernel: audit: type=1400 audit(1747356714.895:1006): avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit: BPF prog-id=136 op=LOAD May 16 00:51:54.895000 audit[3154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2426 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:54.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653330393438323539376535653938373835366534373532616539 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.895000 audit: BPF prog-id=137 op=LOAD May 16 00:51:54.895000 audit[3154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2426 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:54.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653330393438323539376535653938373835366534373532616539 May 16 00:51:54.898000 audit: BPF prog-id=137 op=UNLOAD May 16 00:51:54.898000 audit: BPF prog-id=136 op=UNLOAD May 16 00:51:54.898000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { perfmon } for pid=3154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit[3154]: AVC avc: denied { bpf } for pid=3154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:54.898000 audit: BPF prog-id=138 op=LOAD May 16 00:51:54.898000 audit[3154]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2426 pid=3154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:54.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665653330393438323539376535653938373835366534373532616539 May 16 00:51:54.925794 env[1213]: time="2025-05-16T00:51:54.925748010Z" level=info msg="StartContainer for \"6ee309482597e5e987856e4752ae9847512480e1106a59629b1bec0c3eff9ba9\" returns successfully" May 16 00:51:55.165367 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 16 00:51:55.165486 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 16 00:51:55.244599 env[1213]: time="2025-05-16T00:51:55.244540638Z" level=info msg="StopPodSandbox for \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\"" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.331 [INFO][3206] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.331 [INFO][3206] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" iface="eth0" netns="/var/run/netns/cni-9ef0c817-2a54-983d-e343-8eda7baa46bc" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.332 [INFO][3206] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" iface="eth0" netns="/var/run/netns/cni-9ef0c817-2a54-983d-e343-8eda7baa46bc" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.334 [INFO][3206] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" iface="eth0" netns="/var/run/netns/cni-9ef0c817-2a54-983d-e343-8eda7baa46bc" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.334 [INFO][3206] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.334 [INFO][3206] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.433 [INFO][3222] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.433 [INFO][3222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.434 [INFO][3222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.448 [WARNING][3222] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.448 [INFO][3222] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.450 [INFO][3222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:51:55.455856 env[1213]: 2025-05-16 00:51:55.452 [INFO][3206] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:51:55.456343 env[1213]: time="2025-05-16T00:51:55.455982330Z" level=info msg="TearDown network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\" successfully" May 16 00:51:55.456343 env[1213]: time="2025-05-16T00:51:55.456020771Z" level=info msg="StopPodSandbox for \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\" returns successfully" May 16 00:51:55.534668 kubelet[1956]: I0516 00:51:55.534554 1956 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-9rj7p\" (UniqueName: \"kubernetes.io/projected/27be83d2-fa6b-49b6-be11-287306bf01df-kube-api-access-9rj7p\") pod \"27be83d2-fa6b-49b6-be11-287306bf01df\" (UID: \"27be83d2-fa6b-49b6-be11-287306bf01df\") " May 16 00:51:55.534668 kubelet[1956]: I0516 00:51:55.534621 1956 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-ca-bundle\") pod \"27be83d2-fa6b-49b6-be11-287306bf01df\" (UID: \"27be83d2-fa6b-49b6-be11-287306bf01df\") " May 16 00:51:55.534668 kubelet[1956]: I0516 00:51:55.534643 1956 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-backend-key-pair\") pod \"27be83d2-fa6b-49b6-be11-287306bf01df\" (UID: \"27be83d2-fa6b-49b6-be11-287306bf01df\") " May 16 00:51:55.537237 kubelet[1956]: I0516 00:51:55.537197 1956 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "27be83d2-fa6b-49b6-be11-287306bf01df" (UID: "27be83d2-fa6b-49b6-be11-287306bf01df"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 16 00:51:55.540162 kubelet[1956]: I0516 00:51:55.540126 1956 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/27be83d2-fa6b-49b6-be11-287306bf01df-kube-api-access-9rj7p" (OuterVolumeSpecName: "kube-api-access-9rj7p") pod "27be83d2-fa6b-49b6-be11-287306bf01df" (UID: "27be83d2-fa6b-49b6-be11-287306bf01df"). InnerVolumeSpecName "kube-api-access-9rj7p". PluginName "kubernetes.io/projected", VolumeGidValue "" May 16 00:51:55.540450 kubelet[1956]: I0516 00:51:55.540418 1956 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "27be83d2-fa6b-49b6-be11-287306bf01df" (UID: "27be83d2-fa6b-49b6-be11-287306bf01df"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" May 16 00:51:55.621110 systemd[1]: run-netns-cni\x2d9ef0c817\x2d2a54\x2d983d\x2de343\x2d8eda7baa46bc.mount: Deactivated successfully. May 16 00:51:55.621190 systemd[1]: var-lib-kubelet-pods-27be83d2\x2dfa6b\x2d49b6\x2dbe11\x2d287306bf01df-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d9rj7p.mount: Deactivated successfully. May 16 00:51:55.621247 systemd[1]: var-lib-kubelet-pods-27be83d2\x2dfa6b\x2d49b6\x2dbe11\x2d287306bf01df-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 16 00:51:55.635837 kubelet[1956]: I0516 00:51:55.635800 1956 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-9rj7p\" (UniqueName: \"kubernetes.io/projected/27be83d2-fa6b-49b6-be11-287306bf01df-kube-api-access-9rj7p\") on node \"localhost\" DevicePath \"\"" May 16 00:51:55.635837 kubelet[1956]: I0516 00:51:55.635833 1956 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 16 00:51:55.635980 kubelet[1956]: I0516 00:51:55.635843 1956 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/27be83d2-fa6b-49b6-be11-287306bf01df-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 16 00:51:56.285674 systemd[1]: Removed slice kubepods-besteffort-pod27be83d2_fa6b_49b6_be11_287306bf01df.slice. May 16 00:51:56.378889 kubelet[1956]: I0516 00:51:56.378847 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:51:56.402790 kubelet[1956]: I0516 00:51:56.402737 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-kdhrc" podStartSLOduration=2.686868421 podStartE2EDuration="15.402717811s" podCreationTimestamp="2025-05-16 00:51:41 +0000 UTC" firstStartedPulling="2025-05-16 00:51:42.112514356 +0000 UTC m=+19.931637580" lastFinishedPulling="2025-05-16 00:51:54.828363706 +0000 UTC m=+32.647486970" observedRunningTime="2025-05-16 00:51:55.391544596 +0000 UTC m=+33.210667860" watchObservedRunningTime="2025-05-16 00:51:56.402717811 +0000 UTC m=+34.221841075" May 16 00:51:56.495551 systemd[1]: Created slice kubepods-besteffort-podb7288d17_f2ea_46d6_bdbc_ab977eb53fbe.slice. May 16 00:51:56.541173 kubelet[1956]: I0516 00:51:56.541062 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/b7288d17-f2ea-46d6-bdbc-ab977eb53fbe-whisker-backend-key-pair\") pod \"whisker-7784f6c4dd-m552m\" (UID: \"b7288d17-f2ea-46d6-bdbc-ab977eb53fbe\") " pod="calico-system/whisker-7784f6c4dd-m552m" May 16 00:51:56.541526 kubelet[1956]: I0516 00:51:56.541508 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b7288d17-f2ea-46d6-bdbc-ab977eb53fbe-whisker-ca-bundle\") pod \"whisker-7784f6c4dd-m552m\" (UID: \"b7288d17-f2ea-46d6-bdbc-ab977eb53fbe\") " pod="calico-system/whisker-7784f6c4dd-m552m" May 16 00:51:56.541618 kubelet[1956]: I0516 00:51:56.541604 1956 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p67jd\" (UniqueName: \"kubernetes.io/projected/b7288d17-f2ea-46d6-bdbc-ab977eb53fbe-kube-api-access-p67jd\") pod \"whisker-7784f6c4dd-m552m\" (UID: \"b7288d17-f2ea-46d6-bdbc-ab977eb53fbe\") " pod="calico-system/whisker-7784f6c4dd-m552m" May 16 00:51:56.548000 audit[3285]: AVC avc: denied { write } for pid=3285 comm="tee" name="fd" dev="proc" ino=19813 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:51:56.548000 audit[3285]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff47567d5 a2=241 a3=1b6 items=1 ppid=3251 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.548000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 16 00:51:56.548000 audit: PATH item=0 name="/dev/fd/63" inode=20586 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.548000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:51:56.557000 audit[3301]: AVC avc: denied { write } for pid=3301 comm="tee" name="fd" dev="proc" ino=20599 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:51:56.557000 audit[3301]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff8f267e5 a2=241 a3=1b6 items=1 ppid=3257 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.557000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 16 00:51:56.557000 audit: PATH item=0 name="/dev/fd/63" inode=19817 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.557000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:51:56.559000 audit[3313]: AVC avc: denied { write } for pid=3313 comm="tee" name="fd" dev="proc" ino=18207 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:51:56.559000 audit[3313]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff6a0a7e6 a2=241 a3=1b6 items=1 ppid=3253 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.559000 audit: CWD cwd="/etc/service/enabled/bird/log" May 16 00:51:56.559000 audit: PATH item=0 name="/dev/fd/63" inode=19823 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.559000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:51:56.560000 audit[3321]: AVC avc: denied { write } for pid=3321 comm="tee" name="fd" dev="proc" ino=18826 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:51:56.560000 audit[3321]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce3c77e5 a2=241 a3=1b6 items=1 ppid=3263 pid=3321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.560000 audit: CWD cwd="/etc/service/enabled/felix/log" May 16 00:51:56.560000 audit: PATH item=0 name="/dev/fd/63" inode=18205 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.560000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:51:56.574000 audit[3329]: AVC avc: denied { write } for pid=3329 comm="tee" name="fd" dev="proc" ino=18830 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:51:56.574000 audit[3329]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe01437d6 a2=241 a3=1b6 items=1 ppid=3258 pid=3329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.574000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 16 00:51:56.574000 audit: PATH item=0 name="/dev/fd/63" inode=19830 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.574000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:51:56.577000 audit[3331]: AVC avc: denied { write } for pid=3331 comm="tee" name="fd" dev="proc" ino=19834 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:51:56.577000 audit[3331]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffddb027e5 a2=241 a3=1b6 items=1 ppid=3252 pid=3331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.577000 audit: CWD cwd="/etc/service/enabled/confd/log" May 16 00:51:56.577000 audit: PATH item=0 name="/dev/fd/63" inode=19831 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.577000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:51:56.580000 audit[3307]: AVC avc: denied { write } for pid=3307 comm="tee" name="fd" dev="proc" ino=18834 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:51:56.580000 audit[3307]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdc6587e7 a2=241 a3=1b6 items=1 ppid=3259 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.580000 audit: CWD cwd="/etc/service/enabled/cni/log" May 16 00:51:56.580000 audit: PATH item=0 name="/dev/fd/63" inode=19820 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.580000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:51:56.800800 env[1213]: time="2025-05-16T00:51:56.800704312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7784f6c4dd-m552m,Uid:b7288d17-f2ea-46d6-bdbc-ab977eb53fbe,Namespace:calico-system,Attempt:0,}" May 16 00:51:56.943256 systemd-networkd[1040]: calib4a3c3e4242: Link UP May 16 00:51:56.944727 systemd-networkd[1040]: calib4a3c3e4242: Gained carrier May 16 00:51:56.944978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:51:56.945016 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib4a3c3e4242: link becomes ready May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.853 [INFO][3344] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.865 [INFO][3344] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--7784f6c4dd--m552m-eth0 whisker-7784f6c4dd- calico-system b7288d17-f2ea-46d6-bdbc-ab977eb53fbe 939 0 2025-05-16 00:51:56 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:7784f6c4dd projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-7784f6c4dd-m552m eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calib4a3c3e4242 [] [] }} ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.865 [INFO][3344] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.894 [INFO][3359] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" HandleID="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Workload="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.894 [INFO][3359] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" HandleID="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Workload="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003ac160), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-7784f6c4dd-m552m", "timestamp":"2025-05-16 00:51:56.894532737 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.894 [INFO][3359] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.894 [INFO][3359] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.895 [INFO][3359] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.905 [INFO][3359] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.912 [INFO][3359] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.916 [INFO][3359] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.918 [INFO][3359] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.919 [INFO][3359] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.920 [INFO][3359] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.921 [INFO][3359] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339 May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.924 [INFO][3359] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.929 [INFO][3359] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.929 [INFO][3359] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" host="localhost" May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.929 [INFO][3359] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:51:56.958412 env[1213]: 2025-05-16 00:51:56.929 [INFO][3359] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" HandleID="k8s-pod-network.673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Workload="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" May 16 00:51:56.959209 env[1213]: 2025-05-16 00:51:56.931 [INFO][3344] cni-plugin/k8s.go 418: Populated endpoint ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--7784f6c4dd--m552m-eth0", GenerateName:"whisker-7784f6c4dd-", Namespace:"calico-system", SelfLink:"", UID:"b7288d17-f2ea-46d6-bdbc-ab977eb53fbe", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7784f6c4dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-7784f6c4dd-m552m", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calib4a3c3e4242", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:51:56.959209 env[1213]: 2025-05-16 00:51:56.931 [INFO][3344] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" May 16 00:51:56.959209 env[1213]: 2025-05-16 00:51:56.931 [INFO][3344] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib4a3c3e4242 ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" May 16 00:51:56.959209 env[1213]: 2025-05-16 00:51:56.945 [INFO][3344] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" May 16 00:51:56.959209 env[1213]: 2025-05-16 00:51:56.945 [INFO][3344] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--7784f6c4dd--m552m-eth0", GenerateName:"whisker-7784f6c4dd-", Namespace:"calico-system", SelfLink:"", UID:"b7288d17-f2ea-46d6-bdbc-ab977eb53fbe", ResourceVersion:"939", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"7784f6c4dd", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339", Pod:"whisker-7784f6c4dd-m552m", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calib4a3c3e4242", MAC:"76:c2:4d:e2:44:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:51:56.959209 env[1213]: 2025-05-16 00:51:56.955 [INFO][3344] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339" Namespace="calico-system" Pod="whisker-7784f6c4dd-m552m" WorkloadEndpoint="localhost-k8s-whisker--7784f6c4dd--m552m-eth0" May 16 00:51:56.967287 env[1213]: time="2025-05-16T00:51:56.967216147Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:51:56.967287 env[1213]: time="2025-05-16T00:51:56.967269148Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:51:56.967287 env[1213]: time="2025-05-16T00:51:56.967280148Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:51:56.967545 env[1213]: time="2025-05-16T00:51:56.967506793Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339 pid=3383 runtime=io.containerd.runc.v2 May 16 00:51:56.985655 systemd[1]: Started cri-containerd-673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339.scope. May 16 00:51:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.025000 audit: BPF prog-id=139 op=LOAD May 16 00:51:57.025000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.025000 audit[3393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3383 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:57.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637333933333939376238393763326133363536333336613766623331 May 16 00:51:57.025000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.025000 audit[3393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3383 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:57.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637333933333939376238393763326133363536333336613766623331 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit: BPF prog-id=140 op=LOAD May 16 00:51:57.026000 audit[3393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3383 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:57.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637333933333939376238393763326133363536333336613766623331 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.026000 audit: BPF prog-id=141 op=LOAD May 16 00:51:57.026000 audit[3393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3383 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:57.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637333933333939376238393763326133363536333336613766623331 May 16 00:51:57.027000 audit: BPF prog-id=141 op=UNLOAD May 16 00:51:57.027000 audit: BPF prog-id=140 op=UNLOAD May 16 00:51:57.027000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { perfmon } for pid=3393 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit[3393]: AVC avc: denied { bpf } for pid=3393 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:51:57.027000 audit: BPF prog-id=142 op=LOAD May 16 00:51:57.027000 audit[3393]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3383 pid=3393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:57.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637333933333939376238393763326133363536333336613766623331 May 16 00:51:57.029419 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:51:57.044834 env[1213]: time="2025-05-16T00:51:57.044800525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-7784f6c4dd-m552m,Uid:b7288d17-f2ea-46d6-bdbc-ab977eb53fbe,Namespace:calico-system,Attempt:0,} returns sandbox id \"673933997b897c2a3656336a7fb311f8d63e0742f0cc9f192fca704d914fd339\"" May 16 00:51:57.047429 env[1213]: time="2025-05-16T00:51:57.046335183Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:51:57.211685 env[1213]: time="2025-05-16T00:51:57.211541819Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:51:57.213015 env[1213]: time="2025-05-16T00:51:57.212776553Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:51:57.215382 kubelet[1956]: E0516 00:51:57.215325 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:51:57.215502 kubelet[1956]: E0516 00:51:57.215393 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:51:57.216319 kubelet[1956]: E0516 00:51:57.215660 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:9b5b198180054cbf82bb52eba34561f0,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-p67jd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7784f6c4dd-m552m_calico-system(b7288d17-f2ea-46d6-bdbc-ab977eb53fbe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:51:57.217578 env[1213]: time="2025-05-16T00:51:57.217552051Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:51:57.380745 env[1213]: time="2025-05-16T00:51:57.380695782Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:51:57.381524 env[1213]: time="2025-05-16T00:51:57.381495231Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:51:57.381719 kubelet[1956]: E0516 00:51:57.381679 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:51:57.381796 kubelet[1956]: E0516 00:51:57.381727 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:51:57.381911 kubelet[1956]: E0516 00:51:57.381863 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p67jd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7784f6c4dd-m552m_calico-system(b7288d17-f2ea-46d6-bdbc-ab977eb53fbe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:51:57.383568 kubelet[1956]: E0516 00:51:57.383506 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7784f6c4dd-m552m" podUID="b7288d17-f2ea-46d6-bdbc-ab977eb53fbe" May 16 00:51:58.279915 kubelet[1956]: I0516 00:51:58.279879 1956 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="27be83d2-fa6b-49b6-be11-287306bf01df" path="/var/lib/kubelet/pods/27be83d2-fa6b-49b6-be11-287306bf01df/volumes" May 16 00:51:58.384980 kubelet[1956]: E0516 00:51:58.384929 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-7784f6c4dd-m552m" podUID="b7288d17-f2ea-46d6-bdbc-ab977eb53fbe" May 16 00:51:58.428000 audit[3441]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=3441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:58.428000 audit[3441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=fffffea72d50 a2=0 a3=1 items=0 ppid=2066 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:58.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:58.437000 audit[3441]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:51:58.437000 audit[3441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffea72d50 a2=0 a3=1 items=0 ppid=2066 pid=3441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:58.437000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:51:58.580004 systemd-networkd[1040]: calib4a3c3e4242: Gained IPv6LL May 16 00:52:00.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.127:22-10.0.0.1:33516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:00.901481 systemd[1]: Started sshd@7-10.0.0.127:22-10.0.0.1:33516.service. May 16 00:52:00.902209 kernel: kauditd_printk_skb: 131 callbacks suppressed May 16 00:52:00.902346 kernel: audit: type=1130 audit(1747356720.900:1038): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.127:22-10.0.0.1:33516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:00.947000 audit[3511]: USER_ACCT pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:00.948834 sshd[3511]: Accepted publickey for core from 10.0.0.1 port 33516 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:00.950037 sshd[3511]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:00.948000 audit[3511]: CRED_ACQ pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:00.953646 kernel: audit: type=1101 audit(1747356720.947:1039): pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:00.953713 kernel: audit: type=1103 audit(1747356720.948:1040): pid=3511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:00.955788 kernel: audit: type=1006 audit(1747356720.948:1041): pid=3511 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 16 00:52:00.956057 kernel: audit: type=1300 audit(1747356720.948:1041): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9939dc0 a2=3 a3=1 items=0 ppid=1 pid=3511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:00.948000 audit[3511]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9939dc0 a2=3 a3=1 items=0 ppid=1 pid=3511 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:00.961134 kernel: audit: type=1327 audit(1747356720.948:1041): proctitle=737368643A20636F7265205B707269765D May 16 00:52:00.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:00.963791 systemd-logind[1201]: New session 8 of user core. May 16 00:52:00.964211 systemd[1]: Started session-8.scope. May 16 00:52:00.968000 audit[3511]: USER_START pid=3511 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:00.969000 audit[3521]: CRED_ACQ pid=3521 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:00.974112 kernel: audit: type=1105 audit(1747356720.968:1042): pid=3511 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:00.974167 kernel: audit: type=1103 audit(1747356720.969:1043): pid=3521 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:01.119778 sshd[3511]: pam_unix(sshd:session): session closed for user core May 16 00:52:01.119000 audit[3511]: USER_END pid=3511 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:01.122725 systemd[1]: sshd@7-10.0.0.127:22-10.0.0.1:33516.service: Deactivated successfully. May 16 00:52:01.119000 audit[3511]: CRED_DISP pid=3511 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:01.123495 systemd[1]: session-8.scope: Deactivated successfully. May 16 00:52:01.124130 systemd-logind[1201]: Session 8 logged out. Waiting for processes to exit. May 16 00:52:01.124968 systemd-logind[1201]: Removed session 8. May 16 00:52:01.125404 kernel: audit: type=1106 audit(1747356721.119:1044): pid=3511 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:01.125453 kernel: audit: type=1104 audit(1747356721.119:1045): pid=3511 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:01.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.127:22-10.0.0.1:33516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:02.278428 env[1213]: time="2025-05-16T00:52:02.278043524Z" level=info msg="StopPodSandbox for \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\"" May 16 00:52:02.278428 env[1213]: time="2025-05-16T00:52:02.278053124Z" level=info msg="StopPodSandbox for \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\"" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.330 [INFO][3577] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.330 [INFO][3577] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" iface="eth0" netns="/var/run/netns/cni-1da51d70-30de-edbc-ba1e-fb021cd7a1da" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.330 [INFO][3577] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" iface="eth0" netns="/var/run/netns/cni-1da51d70-30de-edbc-ba1e-fb021cd7a1da" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.330 [INFO][3577] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" iface="eth0" netns="/var/run/netns/cni-1da51d70-30de-edbc-ba1e-fb021cd7a1da" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.331 [INFO][3577] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.331 [INFO][3577] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.347 [INFO][3599] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.347 [INFO][3599] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.347 [INFO][3599] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.355 [WARNING][3599] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.355 [INFO][3599] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.357 [INFO][3599] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:02.361071 env[1213]: 2025-05-16 00:52:02.358 [INFO][3577] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:02.361692 env[1213]: time="2025-05-16T00:52:02.361222118Z" level=info msg="TearDown network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\" successfully" May 16 00:52:02.361692 env[1213]: time="2025-05-16T00:52:02.361253358Z" level=info msg="StopPodSandbox for \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\" returns successfully" May 16 00:52:02.363217 systemd[1]: run-netns-cni\x2d1da51d70\x2d30de\x2dedbc\x2dba1e\x2dfb021cd7a1da.mount: Deactivated successfully. May 16 00:52:02.364102 env[1213]: time="2025-05-16T00:52:02.364030067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c567c48b-pl9jq,Uid:d775377f-1cc8-46ad-b81c-271daff33eaa,Namespace:calico-system,Attempt:1,}" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.329 [INFO][3586] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.329 [INFO][3586] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" iface="eth0" netns="/var/run/netns/cni-1792412a-67c5-aefa-06a1-b95b064d5348" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.329 [INFO][3586] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" iface="eth0" netns="/var/run/netns/cni-1792412a-67c5-aefa-06a1-b95b064d5348" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.329 [INFO][3586] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" iface="eth0" netns="/var/run/netns/cni-1792412a-67c5-aefa-06a1-b95b064d5348" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.329 [INFO][3586] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.329 [INFO][3586] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.348 [INFO][3597] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.348 [INFO][3597] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.357 [INFO][3597] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.367 [WARNING][3597] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.367 [INFO][3597] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.369 [INFO][3597] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:02.373929 env[1213]: 2025-05-16 00:52:02.371 [INFO][3586] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:02.376810 env[1213]: time="2025-05-16T00:52:02.376531719Z" level=info msg="TearDown network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\" successfully" May 16 00:52:02.376810 env[1213]: time="2025-05-16T00:52:02.376562399Z" level=info msg="StopPodSandbox for \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\" returns successfully" May 16 00:52:02.377255 env[1213]: time="2025-05-16T00:52:02.377222206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-tgdhl,Uid:5c0163ae-4ad6-4e9f-8ad8-175069a920ab,Namespace:calico-apiserver,Attempt:1,}" May 16 00:52:02.378164 systemd[1]: run-netns-cni\x2d1792412a\x2d67c5\x2daefa\x2d06a1\x2db95b064d5348.mount: Deactivated successfully. May 16 00:52:02.498885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:52:02.499029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib855e75cfc9: link becomes ready May 16 00:52:02.500234 systemd-networkd[1040]: calib855e75cfc9: Link UP May 16 00:52:02.500374 systemd-networkd[1040]: calib855e75cfc9: Gained carrier May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.407 [INFO][3613] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.419 [INFO][3613] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0 calico-kube-controllers-69c567c48b- calico-system d775377f-1cc8-46ad-b81c-271daff33eaa 1008 0 2025-05-16 00:51:42 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:69c567c48b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-69c567c48b-pl9jq eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calib855e75cfc9 [] [] }} ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.419 [INFO][3613] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.451 [INFO][3643] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" HandleID="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.451 [INFO][3643] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" HandleID="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400034f620), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-69c567c48b-pl9jq", "timestamp":"2025-05-16 00:52:02.451093742 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.451 [INFO][3643] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.451 [INFO][3643] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.451 [INFO][3643] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.459 [INFO][3643] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.463 [INFO][3643] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.471 [INFO][3643] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.475 [INFO][3643] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.478 [INFO][3643] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.478 [INFO][3643] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.481 [INFO][3643] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099 May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.484 [INFO][3643] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.489 [INFO][3643] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.492 [INFO][3643] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" host="localhost" May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.492 [INFO][3643] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:02.511407 env[1213]: 2025-05-16 00:52:02.492 [INFO][3643] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" HandleID="k8s-pod-network.69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.511957 env[1213]: 2025-05-16 00:52:02.495 [INFO][3613] cni-plugin/k8s.go 418: Populated endpoint ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0", GenerateName:"calico-kube-controllers-69c567c48b-", Namespace:"calico-system", SelfLink:"", UID:"d775377f-1cc8-46ad-b81c-271daff33eaa", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c567c48b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-69c567c48b-pl9jq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib855e75cfc9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:02.511957 env[1213]: 2025-05-16 00:52:02.496 [INFO][3613] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.511957 env[1213]: 2025-05-16 00:52:02.496 [INFO][3613] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib855e75cfc9 ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.511957 env[1213]: 2025-05-16 00:52:02.498 [INFO][3613] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.511957 env[1213]: 2025-05-16 00:52:02.499 [INFO][3613] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0", GenerateName:"calico-kube-controllers-69c567c48b-", Namespace:"calico-system", SelfLink:"", UID:"d775377f-1cc8-46ad-b81c-271daff33eaa", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c567c48b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099", Pod:"calico-kube-controllers-69c567c48b-pl9jq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib855e75cfc9", MAC:"c2:38:20:fd:b3:c8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:02.511957 env[1213]: 2025-05-16 00:52:02.509 [INFO][3613] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099" Namespace="calico-system" Pod="calico-kube-controllers-69c567c48b-pl9jq" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:02.520215 env[1213]: time="2025-05-16T00:52:02.520140067Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:02.520215 env[1213]: time="2025-05-16T00:52:02.520192147Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:02.520215 env[1213]: time="2025-05-16T00:52:02.520203267Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:02.520441 env[1213]: time="2025-05-16T00:52:02.520412110Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099 pid=3674 runtime=io.containerd.runc.v2 May 16 00:52:02.530528 systemd[1]: Started cri-containerd-69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099.scope. May 16 00:52:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.565000 audit: BPF prog-id=143 op=LOAD May 16 00:52:02.566000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.566000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3674 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623736396437333034333434383339326135323034356535326466 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3674 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623736396437333034333434383339326135323034356535326466 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit: BPF prog-id=144 op=LOAD May 16 00:52:02.567000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3674 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623736396437333034333434383339326135323034356535326466 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit: BPF prog-id=145 op=LOAD May 16 00:52:02.567000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3674 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623736396437333034333434383339326135323034356535326466 May 16 00:52:02.567000 audit: BPF prog-id=145 op=UNLOAD May 16 00:52:02.567000 audit: BPF prog-id=144 op=UNLOAD May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.567000 audit: BPF prog-id=146 op=LOAD May 16 00:52:02.567000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3674 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623736396437333034333434383339326135323034356535326466 May 16 00:52:02.569499 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:52:02.588164 systemd-networkd[1040]: calibd90a5b390c: Link UP May 16 00:52:02.590155 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibd90a5b390c: link becomes ready May 16 00:52:02.590007 systemd-networkd[1040]: calibd90a5b390c: Gained carrier May 16 00:52:02.595398 env[1213]: time="2025-05-16T00:52:02.595147215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-69c567c48b-pl9jq,Uid:d775377f-1cc8-46ad-b81c-271daff33eaa,Namespace:calico-system,Attempt:1,} returns sandbox id \"69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099\"" May 16 00:52:02.601258 env[1213]: time="2025-05-16T00:52:02.601070637Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.417 [INFO][3628] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.431 [INFO][3628] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0 calico-apiserver-5b48879cf9- calico-apiserver 5c0163ae-4ad6-4e9f-8ad8-175069a920ab 1007 0 2025-05-16 00:51:38 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5b48879cf9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5b48879cf9-tgdhl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibd90a5b390c [] [] }} ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.431 [INFO][3628] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.453 [INFO][3649] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" HandleID="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.453 [INFO][3649] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" HandleID="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000137660), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5b48879cf9-tgdhl", "timestamp":"2025-05-16 00:52:02.453671849 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.453 [INFO][3649] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.492 [INFO][3649] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.492 [INFO][3649] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.560 [INFO][3649] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.564 [INFO][3649] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.569 [INFO][3649] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.571 [INFO][3649] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.573 [INFO][3649] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.573 [INFO][3649] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.574 [INFO][3649] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.577 [INFO][3649] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.583 [INFO][3649] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.583 [INFO][3649] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" host="localhost" May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.583 [INFO][3649] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:02.614523 env[1213]: 2025-05-16 00:52:02.583 [INFO][3649] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" HandleID="k8s-pod-network.a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.615114 env[1213]: 2025-05-16 00:52:02.585 [INFO][3628] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c0163ae-4ad6-4e9f-8ad8-175069a920ab", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5b48879cf9-tgdhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd90a5b390c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:02.615114 env[1213]: 2025-05-16 00:52:02.585 [INFO][3628] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.615114 env[1213]: 2025-05-16 00:52:02.586 [INFO][3628] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibd90a5b390c ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.615114 env[1213]: 2025-05-16 00:52:02.590 [INFO][3628] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.615114 env[1213]: 2025-05-16 00:52:02.593 [INFO][3628] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c0163ae-4ad6-4e9f-8ad8-175069a920ab", ResourceVersion:"1007", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d", Pod:"calico-apiserver-5b48879cf9-tgdhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd90a5b390c", MAC:"66:70:a1:2d:77:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:02.615114 env[1213]: 2025-05-16 00:52:02.612 [INFO][3628] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-tgdhl" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:02.624589 env[1213]: time="2025-05-16T00:52:02.624512923Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:02.624721 env[1213]: time="2025-05-16T00:52:02.624698165Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:02.624815 env[1213]: time="2025-05-16T00:52:02.624788526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:02.625159 env[1213]: time="2025-05-16T00:52:02.625120889Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d pid=3724 runtime=io.containerd.runc.v2 May 16 00:52:02.634674 systemd[1]: Started cri-containerd-a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d.scope. May 16 00:52:02.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit: BPF prog-id=147 op=LOAD May 16 00:52:02.654000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[3735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139666132376335613562356532373363663333636134313364326634 May 16 00:52:02.654000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.654000 audit[3735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.654000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139666132376335613562356532373363663333636134313364326634 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit: BPF prog-id=148 op=LOAD May 16 00:52:02.655000 audit[3735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139666132376335613562356532373363663333636134313364326634 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.655000 audit: BPF prog-id=149 op=LOAD May 16 00:52:02.655000 audit[3735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139666132376335613562356532373363663333636134313364326634 May 16 00:52:02.656000 audit: BPF prog-id=149 op=UNLOAD May 16 00:52:02.656000 audit: BPF prog-id=148 op=UNLOAD May 16 00:52:02.656000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:02.656000 audit: BPF prog-id=150 op=LOAD May 16 00:52:02.656000 audit[3735]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3724 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:02.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139666132376335613562356532373363663333636134313364326634 May 16 00:52:02.658426 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:52:02.673831 env[1213]: time="2025-05-16T00:52:02.673782600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-tgdhl,Uid:5c0163ae-4ad6-4e9f-8ad8-175069a920ab,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d\"" May 16 00:52:03.278440 env[1213]: time="2025-05-16T00:52:03.278372591Z" level=info msg="StopPodSandbox for \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\"" May 16 00:52:03.278751 env[1213]: time="2025-05-16T00:52:03.278475992Z" level=info msg="StopPodSandbox for \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\"" May 16 00:52:03.279071 env[1213]: time="2025-05-16T00:52:03.279047398Z" level=info msg="StopPodSandbox for \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\"" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.328 [INFO][3811] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.328 [INFO][3811] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" iface="eth0" netns="/var/run/netns/cni-f01bcaa4-0774-7fdd-e44e-e7fbef224f01" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.329 [INFO][3811] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" iface="eth0" netns="/var/run/netns/cni-f01bcaa4-0774-7fdd-e44e-e7fbef224f01" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.329 [INFO][3811] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" iface="eth0" netns="/var/run/netns/cni-f01bcaa4-0774-7fdd-e44e-e7fbef224f01" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.329 [INFO][3811] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.329 [INFO][3811] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.359 [INFO][3839] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.359 [INFO][3839] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.359 [INFO][3839] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.373 [WARNING][3839] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.373 [INFO][3839] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.374 [INFO][3839] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:03.380088 env[1213]: 2025-05-16 00:52:03.376 [INFO][3811] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:03.380088 env[1213]: time="2025-05-16T00:52:03.379134780Z" level=info msg="TearDown network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\" successfully" May 16 00:52:03.380088 env[1213]: time="2025-05-16T00:52:03.379166780Z" level=info msg="StopPodSandbox for \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\" returns successfully" May 16 00:52:03.381011 systemd[1]: run-netns-cni\x2df01bcaa4\x2d0774\x2d7fdd\x2de44e\x2de7fbef224f01.mount: Deactivated successfully. May 16 00:52:03.382571 kubelet[1956]: E0516 00:52:03.381307 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:03.384243 env[1213]: time="2025-05-16T00:52:03.382028170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-mxsmq,Uid:1eea67e7-3525-474d-90c3-d26f6070b8be,Namespace:kube-system,Attempt:1,}" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.329 [INFO][3812] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.329 [INFO][3812] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" iface="eth0" netns="/var/run/netns/cni-c8590206-67cc-c909-0d33-bf075891c618" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.329 [INFO][3812] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" iface="eth0" netns="/var/run/netns/cni-c8590206-67cc-c909-0d33-bf075891c618" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.330 [INFO][3812] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" iface="eth0" netns="/var/run/netns/cni-c8590206-67cc-c909-0d33-bf075891c618" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.330 [INFO][3812] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.330 [INFO][3812] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.369 [INFO][3846] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.369 [INFO][3846] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.374 [INFO][3846] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.386 [WARNING][3846] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.386 [INFO][3846] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.387 [INFO][3846] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:03.394991 env[1213]: 2025-05-16 00:52:03.389 [INFO][3812] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:03.396638 systemd[1]: run-netns-cni\x2dc8590206\x2d67cc\x2dc909\x2d0d33\x2dbf075891c618.mount: Deactivated successfully. May 16 00:52:03.397829 env[1213]: time="2025-05-16T00:52:03.397786931Z" level=info msg="TearDown network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\" successfully" May 16 00:52:03.397829 env[1213]: time="2025-05-16T00:52:03.397819651Z" level=info msg="StopPodSandbox for \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\" returns successfully" May 16 00:52:03.400071 env[1213]: time="2025-05-16T00:52:03.400023913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-p45jg,Uid:453d674a-7ed1-42ce-af47-5432d13a4ef8,Namespace:calico-system,Attempt:1,}" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.353 [INFO][3829] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.354 [INFO][3829] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" iface="eth0" netns="/var/run/netns/cni-9dc5c975-7d4d-5031-55db-dd0f65273ac2" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.354 [INFO][3829] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" iface="eth0" netns="/var/run/netns/cni-9dc5c975-7d4d-5031-55db-dd0f65273ac2" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.354 [INFO][3829] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" iface="eth0" netns="/var/run/netns/cni-9dc5c975-7d4d-5031-55db-dd0f65273ac2" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.354 [INFO][3829] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.354 [INFO][3829] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.403 [INFO][3853] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.403 [INFO][3853] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.403 [INFO][3853] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.412 [WARNING][3853] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.412 [INFO][3853] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.416 [INFO][3853] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:03.420181 env[1213]: 2025-05-16 00:52:03.418 [INFO][3829] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:03.420814 env[1213]: time="2025-05-16T00:52:03.420775085Z" level=info msg="TearDown network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\" successfully" May 16 00:52:03.420926 env[1213]: time="2025-05-16T00:52:03.420908687Z" level=info msg="StopPodSandbox for \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\" returns successfully" May 16 00:52:03.421709 env[1213]: time="2025-05-16T00:52:03.421677655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-mrx99,Uid:14889221-6fbd-4a5c-ae89-57afe5cc81db,Namespace:calico-apiserver,Attempt:1,}" May 16 00:52:03.535495 systemd-networkd[1040]: cali693514a6bbd: Link UP May 16 00:52:03.538488 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:52:03.538572 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali693514a6bbd: link becomes ready May 16 00:52:03.538600 systemd-networkd[1040]: cali693514a6bbd: Gained carrier May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.420 [INFO][3863] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.435 [INFO][3863] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0 coredns-7c65d6cfc9- kube-system 1eea67e7-3525-474d-90c3-d26f6070b8be 1027 0 2025-05-16 00:51:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7c65d6cfc9-mxsmq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali693514a6bbd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.435 [INFO][3863] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.475 [INFO][3901] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" HandleID="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.475 [INFO][3901] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" HandleID="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001a2920), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7c65d6cfc9-mxsmq", "timestamp":"2025-05-16 00:52:03.47504904 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.475 [INFO][3901] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.475 [INFO][3901] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.475 [INFO][3901] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.491 [INFO][3901] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.501 [INFO][3901] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.504 [INFO][3901] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.506 [INFO][3901] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.508 [INFO][3901] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.508 [INFO][3901] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.509 [INFO][3901] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.515 [INFO][3901] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.520 [INFO][3901] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.520 [INFO][3901] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" host="localhost" May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.521 [INFO][3901] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:03.554687 env[1213]: 2025-05-16 00:52:03.521 [INFO][3901] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" HandleID="k8s-pod-network.ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.555358 env[1213]: 2025-05-16 00:52:03.528 [INFO][3863] cni-plugin/k8s.go 418: Populated endpoint ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"1eea67e7-3525-474d-90c3-d26f6070b8be", ResourceVersion:"1027", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7c65d6cfc9-mxsmq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali693514a6bbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:03.555358 env[1213]: 2025-05-16 00:52:03.528 [INFO][3863] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.555358 env[1213]: 2025-05-16 00:52:03.528 [INFO][3863] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali693514a6bbd ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.555358 env[1213]: 2025-05-16 00:52:03.539 [INFO][3863] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.555358 env[1213]: 2025-05-16 00:52:03.541 [INFO][3863] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"1eea67e7-3525-474d-90c3-d26f6070b8be", ResourceVersion:"1027", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c", Pod:"coredns-7c65d6cfc9-mxsmq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali693514a6bbd", MAC:"26:ca:d7:77:42:85", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:03.555358 env[1213]: 2025-05-16 00:52:03.552 [INFO][3863] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c" Namespace="kube-system" Pod="coredns-7c65d6cfc9-mxsmq" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:03.574634 env[1213]: time="2025-05-16T00:52:03.568530115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:03.574634 env[1213]: time="2025-05-16T00:52:03.568569155Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:03.574634 env[1213]: time="2025-05-16T00:52:03.568578635Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:03.574634 env[1213]: time="2025-05-16T00:52:03.568699517Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c pid=3943 runtime=io.containerd.runc.v2 May 16 00:52:03.580960 systemd[1]: Started cri-containerd-ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c.scope. May 16 00:52:03.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.599000 audit: BPF prog-id=151 op=LOAD May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3943 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323266336161373262303364343365363835326233343631353332 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3943 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323266336161373262303364343365363835326233343631353332 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit: BPF prog-id=152 op=LOAD May 16 00:52:03.600000 audit[3950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3943 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323266336161373262303364343365363835326233343631353332 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit: BPF prog-id=153 op=LOAD May 16 00:52:03.600000 audit[3950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3943 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323266336161373262303364343365363835326233343631353332 May 16 00:52:03.600000 audit: BPF prog-id=153 op=UNLOAD May 16 00:52:03.600000 audit: BPF prog-id=152 op=UNLOAD May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { perfmon } for pid=3950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit[3950]: AVC avc: denied { bpf } for pid=3950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.600000 audit: BPF prog-id=154 op=LOAD May 16 00:52:03.600000 audit[3950]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3943 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666323266336161373262303364343365363835326233343631353332 May 16 00:52:03.605441 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:52:03.637071 env[1213]: time="2025-05-16T00:52:03.637011575Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-mxsmq,Uid:1eea67e7-3525-474d-90c3-d26f6070b8be,Namespace:kube-system,Attempt:1,} returns sandbox id \"ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c\"" May 16 00:52:03.638275 kubelet[1956]: E0516 00:52:03.637998 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:03.643637 systemd-networkd[1040]: cali6a86eb45f10: Link UP May 16 00:52:03.644876 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6a86eb45f10: link becomes ready May 16 00:52:03.646118 systemd-networkd[1040]: cali6a86eb45f10: Gained carrier May 16 00:52:03.647369 env[1213]: time="2025-05-16T00:52:03.647285120Z" level=info msg="CreateContainer within sandbox \"ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.433 [INFO][3874] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.446 [INFO][3874] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0 goldmane-8f77d7b6c- calico-system 453d674a-7ed1-42ce-af47-5432d13a4ef8 1026 0 2025-05-16 00:51:41 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:8f77d7b6c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-8f77d7b6c-p45jg eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali6a86eb45f10 [] [] }} ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.446 [INFO][3874] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.477 [INFO][3909] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" HandleID="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.477 [INFO][3909] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" HandleID="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400052cb50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-8f77d7b6c-p45jg", "timestamp":"2025-05-16 00:52:03.477367784 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.477 [INFO][3909] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.520 [INFO][3909] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.520 [INFO][3909] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.588 [INFO][3909] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.603 [INFO][3909] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.610 [INFO][3909] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.612 [INFO][3909] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.615 [INFO][3909] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.615 [INFO][3909] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.616 [INFO][3909] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.621 [INFO][3909] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.627 [INFO][3909] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.627 [INFO][3909] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" host="localhost" May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.627 [INFO][3909] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:03.663409 env[1213]: 2025-05-16 00:52:03.627 [INFO][3909] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" HandleID="k8s-pod-network.1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.664800 env[1213]: 2025-05-16 00:52:03.632 [INFO][3874] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"453d674a-7ed1-42ce-af47-5432d13a4ef8", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-8f77d7b6c-p45jg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6a86eb45f10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:03.664800 env[1213]: 2025-05-16 00:52:03.632 [INFO][3874] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.664800 env[1213]: 2025-05-16 00:52:03.632 [INFO][3874] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6a86eb45f10 ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.664800 env[1213]: 2025-05-16 00:52:03.645 [INFO][3874] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.664800 env[1213]: 2025-05-16 00:52:03.652 [INFO][3874] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"453d674a-7ed1-42ce-af47-5432d13a4ef8", ResourceVersion:"1026", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e", Pod:"goldmane-8f77d7b6c-p45jg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6a86eb45f10", MAC:"e2:c9:e2:b4:60:3f", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:03.664800 env[1213]: 2025-05-16 00:52:03.660 [INFO][3874] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e" Namespace="calico-system" Pod="goldmane-8f77d7b6c-p45jg" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:03.672136 env[1213]: time="2025-05-16T00:52:03.672067693Z" level=info msg="CreateContainer within sandbox \"ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4bf7dedd82995a8a88abd17203baf67065016d38e4ed7aa073c0c3c73d5d6675\"" May 16 00:52:03.672752 env[1213]: time="2025-05-16T00:52:03.672716939Z" level=info msg="StartContainer for \"4bf7dedd82995a8a88abd17203baf67065016d38e4ed7aa073c0c3c73d5d6675\"" May 16 00:52:03.675714 env[1213]: time="2025-05-16T00:52:03.675534408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:03.675714 env[1213]: time="2025-05-16T00:52:03.675571568Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:03.675714 env[1213]: time="2025-05-16T00:52:03.675581409Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:03.675847 env[1213]: time="2025-05-16T00:52:03.675788091Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e pid=3998 runtime=io.containerd.runc.v2 May 16 00:52:03.688000 systemd[1]: Started cri-containerd-1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e.scope. May 16 00:52:03.688769 systemd[1]: Started cri-containerd-4bf7dedd82995a8a88abd17203baf67065016d38e4ed7aa073c0c3c73d5d6675.scope. May 16 00:52:03.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.712000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.713000 audit: BPF prog-id=155 op=LOAD May 16 00:52:03.716000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3943 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663764656464383239393561386138386162643137323033626166 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3943 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663764656464383239393561386138386162643137323033626166 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.716000 audit: BPF prog-id=156 op=LOAD May 16 00:52:03.716000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3943 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663764656464383239393561386138386162643137323033626166 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.718000 audit: BPF prog-id=157 op=LOAD May 16 00:52:03.718000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3943 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663764656464383239393561386138386162643137323033626166 May 16 00:52:03.719000 audit: BPF prog-id=157 op=UNLOAD May 16 00:52:03.719000 audit: BPF prog-id=156 op=UNLOAD May 16 00:52:03.719000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.719000 audit: BPF prog-id=158 op=LOAD May 16 00:52:03.719000 audit[4016]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3943 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462663764656464383239393561386138386162643137323033626166 May 16 00:52:03.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.728000 audit: BPF prog-id=159 op=LOAD May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.733989 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7eff8c61b1d: link becomes ready May 16 00:52:03.731000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3998 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135353862396463313832313331613432373162356337316438646564 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3998 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135353862396463313832313331613432373162356337316438646564 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit: BPF prog-id=160 op=LOAD May 16 00:52:03.731000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3998 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135353862396463313832313331613432373162356337316438646564 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit: BPF prog-id=161 op=LOAD May 16 00:52:03.731000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3998 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135353862396463313832313331613432373162356337316438646564 May 16 00:52:03.731000 audit: BPF prog-id=161 op=UNLOAD May 16 00:52:03.731000 audit: BPF prog-id=160 op=UNLOAD May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.731000 audit: BPF prog-id=162 op=LOAD May 16 00:52:03.731000 audit[4017]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3998 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135353862396463313832313331613432373162356337316438646564 May 16 00:52:03.732415 systemd-networkd[1040]: cali7eff8c61b1d: Link UP May 16 00:52:03.733822 systemd-networkd[1040]: cali7eff8c61b1d: Gained carrier May 16 00:52:03.734996 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:52:03.748403 env[1213]: time="2025-05-16T00:52:03.748362552Z" level=info msg="StartContainer for \"4bf7dedd82995a8a88abd17203baf67065016d38e4ed7aa073c0c3c73d5d6675\" returns successfully" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.460 [INFO][3890] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.474 [INFO][3890] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0 calico-apiserver-5b48879cf9- calico-apiserver 14889221-6fbd-4a5c-ae89-57afe5cc81db 1028 0 2025-05-16 00:51:38 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5b48879cf9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5b48879cf9-mrx99 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7eff8c61b1d [] [] }} ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.474 [INFO][3890] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.502 [INFO][3920] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" HandleID="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.502 [INFO][3920] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" HandleID="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005044e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5b48879cf9-mrx99", "timestamp":"2025-05-16 00:52:03.502081996 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.502 [INFO][3920] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.627 [INFO][3920] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.629 [INFO][3920] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.686 [INFO][3920] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.702 [INFO][3920] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.709 [INFO][3920] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.712 [INFO][3920] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.714 [INFO][3920] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.714 [INFO][3920] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.715 [INFO][3920] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.719 [INFO][3920] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.727 [INFO][3920] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.727 [INFO][3920] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" host="localhost" May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.727 [INFO][3920] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:03.755628 env[1213]: 2025-05-16 00:52:03.727 [INFO][3920] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" HandleID="k8s-pod-network.1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.756205 env[1213]: 2025-05-16 00:52:03.729 [INFO][3890] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"14889221-6fbd-4a5c-ae89-57afe5cc81db", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5b48879cf9-mrx99", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7eff8c61b1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:03.756205 env[1213]: 2025-05-16 00:52:03.729 [INFO][3890] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.756205 env[1213]: 2025-05-16 00:52:03.729 [INFO][3890] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7eff8c61b1d ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.756205 env[1213]: 2025-05-16 00:52:03.734 [INFO][3890] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.756205 env[1213]: 2025-05-16 00:52:03.741 [INFO][3890] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"14889221-6fbd-4a5c-ae89-57afe5cc81db", ResourceVersion:"1028", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a", Pod:"calico-apiserver-5b48879cf9-mrx99", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7eff8c61b1d", MAC:"3a:e2:88:0a:b4:05", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:03.756205 env[1213]: 2025-05-16 00:52:03.751 [INFO][3890] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a" Namespace="calico-apiserver" Pod="calico-apiserver-5b48879cf9-mrx99" WorkloadEndpoint="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:03.767466 env[1213]: time="2025-05-16T00:52:03.767423107Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-p45jg,Uid:453d674a-7ed1-42ce-af47-5432d13a4ef8,Namespace:calico-system,Attempt:1,} returns sandbox id \"1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e\"" May 16 00:52:03.775406 env[1213]: time="2025-05-16T00:52:03.775341748Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:03.775551 env[1213]: time="2025-05-16T00:52:03.775391588Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:03.775620 env[1213]: time="2025-05-16T00:52:03.775543310Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:03.775871 env[1213]: time="2025-05-16T00:52:03.775829073Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a pid=4076 runtime=io.containerd.runc.v2 May 16 00:52:03.800642 systemd[1]: Started cri-containerd-1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a.scope. May 16 00:52:03.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.828000 audit: BPF prog-id=163 op=LOAD May 16 00:52:03.829000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400018db38 a2=10 a3=0 items=0 ppid=4076 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316362303333323731353634643332613831326136643031323662 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400018d5a0 a2=3c a3=0 items=0 ppid=4076 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316362303333323731353634643332613831326136643031323662 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.829000 audit: BPF prog-id=164 op=LOAD May 16 00:52:03.829000 audit[4085]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400018d8e0 a2=78 a3=0 items=0 ppid=4076 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.829000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316362303333323731353634643332613831326136643031323662 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit: BPF prog-id=165 op=LOAD May 16 00:52:03.831000 audit[4085]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400018d670 a2=78 a3=0 items=0 ppid=4076 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316362303333323731353634643332613831326136643031323662 May 16 00:52:03.831000 audit: BPF prog-id=165 op=UNLOAD May 16 00:52:03.831000 audit: BPF prog-id=164 op=UNLOAD May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { perfmon } for pid=4085 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit[4085]: AVC avc: denied { bpf } for pid=4085 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:03.831000 audit: BPF prog-id=166 op=LOAD May 16 00:52:03.831000 audit[4085]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400018db40 a2=78 a3=0 items=0 ppid=4076 pid=4085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:03.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3164316362303333323731353634643332613831326136643031323662 May 16 00:52:03.834116 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:52:03.838000 audit[4036]: AVC avc: denied { getattr } for pid=4036 comm="coredns" path="cgroup:[4026532533]" dev="nsfs" ino=4026532533 scontext=system_u:system_r:svirt_lxc_net_t:s0:c661,c747 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 16 00:52:03.838000 audit[4036]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056960 a2=400014c578 a3=0 items=0 ppid=3943 pid=4036 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c661,c747 key=(null) May 16 00:52:03.838000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 16 00:52:03.856480 env[1213]: time="2025-05-16T00:52:03.856445936Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5b48879cf9-mrx99,Uid:14889221-6fbd-4a5c-ae89-57afe5cc81db,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a\"" May 16 00:52:04.280012 env[1213]: time="2025-05-16T00:52:04.279914385Z" level=info msg="StopPodSandbox for \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\"" May 16 00:52:04.282671 env[1213]: time="2025-05-16T00:52:04.280937115Z" level=info msg="StopPodSandbox for \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\"" May 16 00:52:04.368217 systemd[1]: run-netns-cni\x2d9dc5c975\x2d7d4d\x2d5031\x2d55db\x2ddd0f65273ac2.mount: Deactivated successfully. May 16 00:52:04.400731 kubelet[1956]: E0516 00:52:04.400399 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:04.406937 systemd-networkd[1040]: calib855e75cfc9: Gained IPv6LL May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.349 [INFO][4161] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.349 [INFO][4161] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" iface="eth0" netns="/var/run/netns/cni-1e5c8a5b-6ee4-0a64-af1b-eb54e755b1de" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.349 [INFO][4161] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" iface="eth0" netns="/var/run/netns/cni-1e5c8a5b-6ee4-0a64-af1b-eb54e755b1de" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.349 [INFO][4161] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" iface="eth0" netns="/var/run/netns/cni-1e5c8a5b-6ee4-0a64-af1b-eb54e755b1de" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.349 [INFO][4161] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.349 [INFO][4161] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.381 [INFO][4178] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.381 [INFO][4178] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.381 [INFO][4178] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.390 [WARNING][4178] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.391 [INFO][4178] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.394 [INFO][4178] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:04.408139 env[1213]: 2025-05-16 00:52:04.401 [INFO][4161] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:04.422947 kubelet[1956]: I0516 00:52:04.418745 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-mxsmq" podStartSLOduration=35.418729445 podStartE2EDuration="35.418729445s" podCreationTimestamp="2025-05-16 00:51:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:52:04.418632444 +0000 UTC m=+42.237755748" watchObservedRunningTime="2025-05-16 00:52:04.418729445 +0000 UTC m=+42.237852709" May 16 00:52:04.421186 systemd[1]: run-netns-cni\x2d1e5c8a5b\x2d6ee4\x2d0a64\x2daf1b\x2deb54e755b1de.mount: Deactivated successfully. May 16 00:52:04.423371 env[1213]: time="2025-05-16T00:52:04.419098528Z" level=info msg="TearDown network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\" successfully" May 16 00:52:04.423371 env[1213]: time="2025-05-16T00:52:04.419132689Z" level=info msg="StopPodSandbox for \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\" returns successfully" May 16 00:52:04.423371 env[1213]: time="2025-05-16T00:52:04.423300930Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5kxv9,Uid:8d4db442-957c-4bac-a386-8c53068d9f22,Namespace:kube-system,Attempt:1,}" May 16 00:52:04.423453 kubelet[1956]: E0516 00:52:04.422979 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:04.426000 audit[4197]: NETFILTER_CFG table=filter:101 family=2 entries=22 op=nft_register_rule pid=4197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:04.426000 audit[4197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffecb194c0 a2=0 a3=1 items=0 ppid=2066 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:04.432000 audit[4197]: NETFILTER_CFG table=nat:102 family=2 entries=12 op=nft_register_rule pid=4197 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:04.432000 audit[4197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffecb194c0 a2=0 a3=1 items=0 ppid=2066 pid=4197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:04.466000 audit[4199]: NETFILTER_CFG table=filter:103 family=2 entries=19 op=nft_register_rule pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:04.466000 audit[4199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe3db2540 a2=0 a3=1 items=0 ppid=2066 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:04.473000 audit[4199]: NETFILTER_CFG table=nat:104 family=2 entries=33 op=nft_register_chain pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:04.473000 audit[4199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffe3db2540 a2=0 a3=1 items=0 ppid=2066 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.373 [INFO][4169] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.373 [INFO][4169] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" iface="eth0" netns="/var/run/netns/cni-c5efb569-5da3-e117-d9de-778cb8c5283c" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.373 [INFO][4169] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" iface="eth0" netns="/var/run/netns/cni-c5efb569-5da3-e117-d9de-778cb8c5283c" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.374 [INFO][4169] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" iface="eth0" netns="/var/run/netns/cni-c5efb569-5da3-e117-d9de-778cb8c5283c" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.374 [INFO][4169] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.374 [INFO][4169] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.468 [INFO][4187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.468 [INFO][4187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.469 [INFO][4187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.483 [WARNING][4187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.483 [INFO][4187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.485 [INFO][4187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:04.495935 env[1213]: 2025-05-16 00:52:04.488 [INFO][4169] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:04.495935 env[1213]: time="2025-05-16T00:52:04.495499728Z" level=info msg="TearDown network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\" successfully" May 16 00:52:04.495935 env[1213]: time="2025-05-16T00:52:04.495535368Z" level=info msg="StopPodSandbox for \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\" returns successfully" May 16 00:52:04.495319 systemd[1]: run-netns-cni\x2dc5efb569\x2d5da3\x2de117\x2dd9de\x2d778cb8c5283c.mount: Deactivated successfully. May 16 00:52:04.496457 env[1213]: time="2025-05-16T00:52:04.496113334Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfrqm,Uid:561a2113-fd27-44d9-9df0-c2cfce17e3bf,Namespace:calico-system,Attempt:1,}" May 16 00:52:04.596024 systemd-networkd[1040]: calibd90a5b390c: Gained IPv6LL May 16 00:52:04.607451 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:52:04.607562 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliba02ace6c10: link becomes ready May 16 00:52:04.606088 systemd-networkd[1040]: caliba02ace6c10: Link UP May 16 00:52:04.607928 systemd-networkd[1040]: caliba02ace6c10: Gained carrier May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.509 [INFO][4200] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.521 [INFO][4200] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0 coredns-7c65d6cfc9- kube-system 8d4db442-957c-4bac-a386-8c53068d9f22 1055 0 2025-05-16 00:51:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7c65d6cfc9-5kxv9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliba02ace6c10 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.521 [INFO][4200] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.560 [INFO][4228] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" HandleID="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.560 [INFO][4228] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" HandleID="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000594af0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7c65d6cfc9-5kxv9", "timestamp":"2025-05-16 00:52:04.560739456 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.561 [INFO][4228] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.561 [INFO][4228] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.561 [INFO][4228] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.571 [INFO][4228] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.578 [INFO][4228] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.582 [INFO][4228] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.584 [INFO][4228] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.586 [INFO][4228] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.586 [INFO][4228] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.587 [INFO][4228] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.591 [INFO][4228] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.597 [INFO][4228] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.597 [INFO][4228] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" host="localhost" May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.597 [INFO][4228] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:04.618004 env[1213]: 2025-05-16 00:52:04.597 [INFO][4228] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" HandleID="k8s-pod-network.f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.618627 env[1213]: 2025-05-16 00:52:04.603 [INFO][4200] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"8d4db442-957c-4bac-a386-8c53068d9f22", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7c65d6cfc9-5kxv9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba02ace6c10", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:04.618627 env[1213]: 2025-05-16 00:52:04.603 [INFO][4200] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.618627 env[1213]: 2025-05-16 00:52:04.603 [INFO][4200] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliba02ace6c10 ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.618627 env[1213]: 2025-05-16 00:52:04.607 [INFO][4200] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.618627 env[1213]: 2025-05-16 00:52:04.607 [INFO][4200] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"8d4db442-957c-4bac-a386-8c53068d9f22", ResourceVersion:"1055", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce", Pod:"coredns-7c65d6cfc9-5kxv9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba02ace6c10", MAC:"62:5e:f9:77:8c:e1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:04.618627 env[1213]: 2025-05-16 00:52:04.616 [INFO][4200] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce" Namespace="kube-system" Pod="coredns-7c65d6cfc9-5kxv9" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:04.649994 env[1213]: time="2025-05-16T00:52:04.649919262Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:04.649994 env[1213]: time="2025-05-16T00:52:04.649961823Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:04.649994 env[1213]: time="2025-05-16T00:52:04.649971783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:04.650254 env[1213]: time="2025-05-16T00:52:04.650191105Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce pid=4262 runtime=io.containerd.runc.v2 May 16 00:52:04.661078 systemd[1]: Started cri-containerd-f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce.scope. May 16 00:52:04.705265 systemd-networkd[1040]: cali231e70a2b67: Link UP May 16 00:52:04.709470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali231e70a2b67: link becomes ready May 16 00:52:04.709037 systemd-networkd[1040]: cali231e70a2b67: Gained carrier May 16 00:52:04.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit: BPF prog-id=167 op=LOAD May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373462373135623330373366663837663932643231393265396561 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373462373135623330373366663837663932643231393265396561 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit: BPF prog-id=168 op=LOAD May 16 00:52:04.722000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373462373135623330373366663837663932643231393265396561 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit: BPF prog-id=169 op=LOAD May 16 00:52:04.722000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373462373135623330373366663837663932643231393265396561 May 16 00:52:04.722000 audit: BPF prog-id=169 op=UNLOAD May 16 00:52:04.722000 audit: BPF prog-id=168 op=UNLOAD May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { perfmon } for pid=4273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit[4273]: AVC avc: denied { bpf } for pid=4273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.722000 audit: BPF prog-id=170 op=LOAD May 16 00:52:04.722000 audit[4273]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4262 pid=4273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636373462373135623330373366663837663932643231393265396561 May 16 00:52:04.724727 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.538 [INFO][4212] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.553 [INFO][4212] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--vfrqm-eth0 csi-node-driver- calico-system 561a2113-fd27-44d9-9df0-c2cfce17e3bf 1056 0 2025-05-16 00:51:42 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-vfrqm eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali231e70a2b67 [] [] }} ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.553 [INFO][4212] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.590 [INFO][4237] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" HandleID="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.590 [INFO][4237] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" HandleID="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001374a0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-vfrqm", "timestamp":"2025-05-16 00:52:04.590743834 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.591 [INFO][4237] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.598 [INFO][4237] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.598 [INFO][4237] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.671 [INFO][4237] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.679 [INFO][4237] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.683 [INFO][4237] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.684 [INFO][4237] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.686 [INFO][4237] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.686 [INFO][4237] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.687 [INFO][4237] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.691 [INFO][4237] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.696 [INFO][4237] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.696 [INFO][4237] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" host="localhost" May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.696 [INFO][4237] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:04.725750 env[1213]: 2025-05-16 00:52:04.696 [INFO][4237] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" HandleID="k8s-pod-network.f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.726319 env[1213]: 2025-05-16 00:52:04.701 [INFO][4212] cni-plugin/k8s.go 418: Populated endpoint ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vfrqm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"561a2113-fd27-44d9-9df0-c2cfce17e3bf", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-vfrqm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali231e70a2b67", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:04.726319 env[1213]: 2025-05-16 00:52:04.701 [INFO][4212] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.726319 env[1213]: 2025-05-16 00:52:04.701 [INFO][4212] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali231e70a2b67 ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.726319 env[1213]: 2025-05-16 00:52:04.710 [INFO][4212] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.726319 env[1213]: 2025-05-16 00:52:04.710 [INFO][4212] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vfrqm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"561a2113-fd27-44d9-9df0-c2cfce17e3bf", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a", Pod:"csi-node-driver-vfrqm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali231e70a2b67", MAC:"f6:a8:3b:50:f4:f8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:04.726319 env[1213]: 2025-05-16 00:52:04.721 [INFO][4212] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a" Namespace="calico-system" Pod="csi-node-driver-vfrqm" WorkloadEndpoint="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:04.743492 env[1213]: time="2025-05-16T00:52:04.743432952Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-5kxv9,Uid:8d4db442-957c-4bac-a386-8c53068d9f22,Namespace:kube-system,Attempt:1,} returns sandbox id \"f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce\"" May 16 00:52:04.745858 kubelet[1956]: E0516 00:52:04.744278 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:04.757882 env[1213]: time="2025-05-16T00:52:04.747622113Z" level=info msg="CreateContainer within sandbox \"f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 16 00:52:04.784725 env[1213]: time="2025-05-16T00:52:04.784675162Z" level=info msg="CreateContainer within sandbox \"f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8d8ee67daabe0562440b448420ee539d8b272a8cb202f50acb592113bb41e731\"" May 16 00:52:04.785591 env[1213]: time="2025-05-16T00:52:04.785559131Z" level=info msg="StartContainer for \"8d8ee67daabe0562440b448420ee539d8b272a8cb202f50acb592113bb41e731\"" May 16 00:52:04.794766 env[1213]: time="2025-05-16T00:52:04.794707741Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:04.795085 env[1213]: time="2025-05-16T00:52:04.794748502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:04.795085 env[1213]: time="2025-05-16T00:52:04.794758662Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:04.795085 env[1213]: time="2025-05-16T00:52:04.794939984Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a pid=4309 runtime=io.containerd.runc.v2 May 16 00:52:04.807947 systemd[1]: Started cri-containerd-8d8ee67daabe0562440b448420ee539d8b272a8cb202f50acb592113bb41e731.scope. May 16 00:52:04.830087 systemd[1]: Started cri-containerd-f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a.scope. May 16 00:52:04.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.851000 audit: BPF prog-id=171 op=LOAD May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4262 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864386565363764616162653035363234343062343438343230656535 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4262 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864386565363764616162653035363234343062343438343230656535 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit: BPF prog-id=172 op=LOAD May 16 00:52:04.852000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4262 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864386565363764616162653035363234343062343438343230656535 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit: BPF prog-id=173 op=LOAD May 16 00:52:04.852000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4262 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864386565363764616162653035363234343062343438343230656535 May 16 00:52:04.852000 audit: BPF prog-id=173 op=UNLOAD May 16 00:52:04.852000 audit: BPF prog-id=172 op=UNLOAD May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { perfmon } for pid=4324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit[4324]: AVC avc: denied { bpf } for pid=4324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.852000 audit: BPF prog-id=174 op=LOAD May 16 00:52:04.852000 audit[4324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4262 pid=4324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864386565363764616162653035363234343062343438343230656535 May 16 00:52:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit: BPF prog-id=175 op=LOAD May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4309 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326335613039636433326562313939386135636262613830313937 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4309 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326335613039636433326562313939386135636262613830313937 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit: BPF prog-id=176 op=LOAD May 16 00:52:04.861000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4309 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326335613039636433326562313939386135636262613830313937 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.861000 audit: BPF prog-id=177 op=LOAD May 16 00:52:04.861000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4309 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326335613039636433326562313939386135636262613830313937 May 16 00:52:04.861000 audit: BPF prog-id=177 op=UNLOAD May 16 00:52:04.861000 audit: BPF prog-id=176 op=UNLOAD May 16 00:52:04.862000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.862000 audit: BPF prog-id=178 op=LOAD May 16 00:52:04.862000 audit[4333]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4309 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631326335613039636433326562313939386135636262613830313937 May 16 00:52:04.868024 systemd-resolved[1153]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:52:04.872533 env[1213]: time="2025-05-16T00:52:04.872484754Z" level=info msg="StartContainer for \"8d8ee67daabe0562440b448420ee539d8b272a8cb202f50acb592113bb41e731\" returns successfully" May 16 00:52:04.881308 env[1213]: time="2025-05-16T00:52:04.881255322Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vfrqm,Uid:561a2113-fd27-44d9-9df0-c2cfce17e3bf,Namespace:calico-system,Attempt:1,} returns sandbox id \"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a\"" May 16 00:52:04.887000 audit[4342]: AVC avc: denied { getattr } for pid=4342 comm="coredns" path="cgroup:[4026532479]" dev="nsfs" ino=4026532479 scontext=system_u:system_r:svirt_lxc_net_t:s0:c490,c498 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 16 00:52:04.887000 audit[4342]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=40001ccaf8 a2=40001ce578 a3=0 items=0 ppid=4262 pid=4342 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c490,c498 key=(null) May 16 00:52:04.887000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 16 00:52:04.921633 env[1213]: time="2025-05-16T00:52:04.921581482Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:04.922998 env[1213]: time="2025-05-16T00:52:04.922969256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:04.924599 env[1213]: time="2025-05-16T00:52:04.924572312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:04.925924 env[1213]: time="2025-05-16T00:52:04.925898005Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:04.926401 env[1213]: time="2025-05-16T00:52:04.926369370Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373\"" May 16 00:52:04.928015 env[1213]: time="2025-05-16T00:52:04.927986986Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 16 00:52:04.933582 env[1213]: time="2025-05-16T00:52:04.933540561Z" level=info msg="CreateContainer within sandbox \"69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 16 00:52:04.943149 env[1213]: time="2025-05-16T00:52:04.943105536Z" level=info msg="CreateContainer within sandbox \"69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"77b49da9bedde478af09cfb519eae8c2aed77640c59654a276487b826e905f1c\"" May 16 00:52:04.943626 env[1213]: time="2025-05-16T00:52:04.943545301Z" level=info msg="StartContainer for \"77b49da9bedde478af09cfb519eae8c2aed77640c59654a276487b826e905f1c\"" May 16 00:52:04.957800 systemd[1]: Started cri-containerd-77b49da9bedde478af09cfb519eae8c2aed77640c59654a276487b826e905f1c.scope. May 16 00:52:04.981047 systemd-networkd[1040]: cali693514a6bbd: Gained IPv6LL May 16 00:52:04.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit: BPF prog-id=179 op=LOAD May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3674 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737623439646139626564646534373861663039636662353139656165 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3674 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737623439646139626564646534373861663039636662353139656165 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit: BPF prog-id=180 op=LOAD May 16 00:52:04.983000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3674 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737623439646139626564646534373861663039636662353139656165 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit: BPF prog-id=181 op=LOAD May 16 00:52:04.983000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3674 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737623439646139626564646534373861663039636662353139656165 May 16 00:52:04.983000 audit: BPF prog-id=181 op=UNLOAD May 16 00:52:04.983000 audit: BPF prog-id=180 op=UNLOAD May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { perfmon } for pid=4383 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit[4383]: AVC avc: denied { bpf } for pid=4383 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:04.983000 audit: BPF prog-id=182 op=LOAD May 16 00:52:04.983000 audit[4383]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3674 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:04.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737623439646139626564646534373861663039636662353139656165 May 16 00:52:05.002092 env[1213]: time="2025-05-16T00:52:05.002012241Z" level=info msg="StartContainer for \"77b49da9bedde478af09cfb519eae8c2aed77640c59654a276487b826e905f1c\" returns successfully" May 16 00:52:05.045026 systemd-networkd[1040]: cali7eff8c61b1d: Gained IPv6LL May 16 00:52:05.235109 kubelet[1956]: I0516 00:52:05.234571 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:52:05.237015 systemd-networkd[1040]: cali6a86eb45f10: Gained IPv6LL May 16 00:52:05.426601 kubelet[1956]: E0516 00:52:05.426560 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:05.434604 kubelet[1956]: E0516 00:52:05.434567 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:05.444199 kubelet[1956]: I0516 00:52:05.443212 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-5kxv9" podStartSLOduration=36.443190108 podStartE2EDuration="36.443190108s" podCreationTimestamp="2025-05-16 00:51:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:52:05.441960416 +0000 UTC m=+43.261083680" watchObservedRunningTime="2025-05-16 00:52:05.443190108 +0000 UTC m=+43.262313372" May 16 00:52:05.459405 systemd[1]: run-containerd-runc-k8s.io-77b49da9bedde478af09cfb519eae8c2aed77640c59654a276487b826e905f1c-runc.F37kFi.mount: Deactivated successfully. May 16 00:52:05.467000 audit[4497]: NETFILTER_CFG table=filter:105 family=2 entries=16 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:05.467000 audit[4497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd049d970 a2=0 a3=1 items=0 ppid=2066 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.467000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:05.472000 audit[4497]: NETFILTER_CFG table=nat:106 family=2 entries=42 op=nft_register_rule pid=4497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:05.472000 audit[4497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffd049d970 a2=0 a3=1 items=0 ppid=2066 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:05.506121 kubelet[1956]: I0516 00:52:05.505656 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-69c567c48b-pl9jq" podStartSLOduration=21.178620441 podStartE2EDuration="23.505639952s" podCreationTimestamp="2025-05-16 00:51:42 +0000 UTC" firstStartedPulling="2025-05-16 00:52:02.600526031 +0000 UTC m=+40.419649295" lastFinishedPulling="2025-05-16 00:52:04.927545542 +0000 UTC m=+42.746668806" observedRunningTime="2025-05-16 00:52:05.464536034 +0000 UTC m=+43.283659298" watchObservedRunningTime="2025-05-16 00:52:05.505639952 +0000 UTC m=+43.324763176" May 16 00:52:05.940035 systemd-networkd[1040]: caliba02ace6c10: Gained IPv6LL May 16 00:52:06.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.127:22-10.0.0.1:41250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:06.125022 systemd[1]: Started sshd@8-10.0.0.127:22-10.0.0.1:41250.service. May 16 00:52:06.126207 kernel: kauditd_printk_skb: 595 callbacks suppressed May 16 00:52:06.126278 kernel: audit: type=1130 audit(1747356726.124:1235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.127:22-10.0.0.1:41250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:06.170000 audit[4518]: USER_ACCT pid=4518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.172964 sshd[4518]: Accepted publickey for core from 10.0.0.1 port 41250 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:06.174881 kernel: audit: type=1101 audit(1747356726.170:1236): pid=4518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.174000 audit[4518]: CRED_ACQ pid=4518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.175770 sshd[4518]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:06.180411 kernel: audit: type=1103 audit(1747356726.174:1237): pid=4518 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.180485 kernel: audit: type=1006 audit(1747356726.174:1238): pid=4518 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 16 00:52:06.180517 kernel: audit: type=1300 audit(1747356726.174:1238): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffddcc90 a2=3 a3=1 items=0 ppid=1 pid=4518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:06.174000 audit[4518]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffffddcc90 a2=3 a3=1 items=0 ppid=1 pid=4518 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:06.182986 systemd[1]: Started session-9.scope. May 16 00:52:06.183921 systemd-logind[1201]: New session 9 of user core. May 16 00:52:06.174000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:06.187090 kernel: audit: type=1327 audit(1747356726.174:1238): proctitle=737368643A20636F7265205B707269765D May 16 00:52:06.188000 audit[4518]: USER_START pid=4518 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.188000 audit[4521]: CRED_ACQ pid=4521 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.197358 kernel: audit: type=1105 audit(1747356726.188:1239): pid=4518 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.197805 kernel: audit: type=1103 audit(1747356726.188:1240): pid=4521 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.426310 sshd[4518]: pam_unix(sshd:session): session closed for user core May 16 00:52:06.427000 audit[4518]: USER_END pid=4518 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.429432 systemd[1]: sshd@8-10.0.0.127:22-10.0.0.1:41250.service: Deactivated successfully. May 16 00:52:06.430233 systemd[1]: session-9.scope: Deactivated successfully. May 16 00:52:06.430759 systemd-logind[1201]: Session 9 logged out. Waiting for processes to exit. May 16 00:52:06.427000 audit[4518]: CRED_DISP pid=4518 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.431451 systemd-logind[1201]: Removed session 9. May 16 00:52:06.433117 kernel: audit: type=1106 audit(1747356726.427:1241): pid=4518 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.433202 kernel: audit: type=1104 audit(1747356726.427:1242): pid=4518 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:06.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.127:22-10.0.0.1:41250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:06.436595 kubelet[1956]: E0516 00:52:06.436554 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:06.437136 kubelet[1956]: E0516 00:52:06.437094 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:06.487000 audit[4548]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:06.487000 audit[4548]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffea6425c0 a2=0 a3=1 items=0 ppid=2066 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:06.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:06.502000 audit[4548]: NETFILTER_CFG table=nat:108 family=2 entries=54 op=nft_register_chain pid=4548 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:06.502000 audit[4548]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffea6425c0 a2=0 a3=1 items=0 ppid=2066 pid=4548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:06.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:06.772048 systemd-networkd[1040]: cali231e70a2b67: Gained IPv6LL May 16 00:52:07.053243 kubelet[1956]: I0516 00:52:07.052830 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:52:07.053243 kubelet[1956]: E0516 00:52:07.053171 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:07.167949 env[1213]: time="2025-05-16T00:52:07.167906680Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.169378 env[1213]: time="2025-05-16T00:52:07.169338893Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.171125 env[1213]: time="2025-05-16T00:52:07.171089989Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.172321 env[1213]: time="2025-05-16T00:52:07.172176359Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.172935 env[1213]: time="2025-05-16T00:52:07.172899286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 16 00:52:07.174128 env[1213]: time="2025-05-16T00:52:07.174104337Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:52:07.176413 env[1213]: time="2025-05-16T00:52:07.176384478Z" level=info msg="CreateContainer within sandbox \"a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 16 00:52:07.187264 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2182493007.mount: Deactivated successfully. May 16 00:52:07.187994 env[1213]: time="2025-05-16T00:52:07.187958184Z" level=info msg="CreateContainer within sandbox \"a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f6d7a3b5ba35aae86eb3f895a964223c8934feac9780913dc2514f3696b233ec\"" May 16 00:52:07.189530 env[1213]: time="2025-05-16T00:52:07.188485748Z" level=info msg="StartContainer for \"f6d7a3b5ba35aae86eb3f895a964223c8934feac9780913dc2514f3696b233ec\"" May 16 00:52:07.225821 systemd[1]: Started cri-containerd-f6d7a3b5ba35aae86eb3f895a964223c8934feac9780913dc2514f3696b233ec.scope. May 16 00:52:07.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.241000 audit: BPF prog-id=183 op=LOAD May 16 00:52:07.242000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3724 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636643761336235626133356161653836656233663839356139363432 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3724 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636643761336235626133356161653836656233663839356139363432 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.242000 audit: BPF prog-id=184 op=LOAD May 16 00:52:07.242000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3724 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636643761336235626133356161653836656233663839356139363432 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.243000 audit: BPF prog-id=185 op=LOAD May 16 00:52:07.243000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3724 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.243000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636643761336235626133356161653836656233663839356139363432 May 16 00:52:07.243000 audit: BPF prog-id=185 op=UNLOAD May 16 00:52:07.244000 audit: BPF prog-id=184 op=UNLOAD May 16 00:52:07.244000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.244000 audit: BPF prog-id=186 op=LOAD May 16 00:52:07.244000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3724 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.244000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636643761336235626133356161653836656233663839356139363432 May 16 00:52:07.314327 env[1213]: time="2025-05-16T00:52:07.314212100Z" level=info msg="StartContainer for \"f6d7a3b5ba35aae86eb3f895a964223c8934feac9780913dc2514f3696b233ec\" returns successfully" May 16 00:52:07.351338 env[1213]: time="2025-05-16T00:52:07.350936596Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:52:07.351793 env[1213]: time="2025-05-16T00:52:07.351751084Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:52:07.352063 kubelet[1956]: E0516 00:52:07.352029 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:52:07.352234 kubelet[1956]: E0516 00:52:07.352073 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:52:07.352359 kubelet[1956]: E0516 00:52:07.352307 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zbxj6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-p45jg_calico-system(453d674a-7ed1-42ce-af47-5432d13a4ef8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:52:07.352582 env[1213]: time="2025-05-16T00:52:07.352549491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 16 00:52:07.353829 kubelet[1956]: E0516 00:52:07.353599 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:52:07.442596 kubelet[1956]: E0516 00:52:07.442560 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:07.442923 kubelet[1956]: E0516 00:52:07.442730 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:07.443316 kubelet[1956]: E0516 00:52:07.443280 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:52:07.475346 kubelet[1956]: I0516 00:52:07.475277 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5b48879cf9-tgdhl" podStartSLOduration=24.976204492 podStartE2EDuration="29.475260255s" podCreationTimestamp="2025-05-16 00:51:38 +0000 UTC" firstStartedPulling="2025-05-16 00:52:02.674890492 +0000 UTC m=+40.494013756" lastFinishedPulling="2025-05-16 00:52:07.173946295 +0000 UTC m=+44.993069519" observedRunningTime="2025-05-16 00:52:07.475105573 +0000 UTC m=+45.294228837" watchObservedRunningTime="2025-05-16 00:52:07.475260255 +0000 UTC m=+45.294383519" May 16 00:52:07.483000 audit[4628]: NETFILTER_CFG table=filter:109 family=2 entries=15 op=nft_register_rule pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:07.483000 audit[4628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc40453f0 a2=0 a3=1 items=0 ppid=2066 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:07.487000 audit[4628]: NETFILTER_CFG table=nat:110 family=2 entries=25 op=nft_register_chain pid=4628 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:07.487000 audit[4628]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffc40453f0 a2=0 a3=1 items=0 ppid=2066 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:07.586741 env[1213]: time="2025-05-16T00:52:07.586628635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.588023 env[1213]: time="2025-05-16T00:52:07.587985127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.589247 env[1213]: time="2025-05-16T00:52:07.589203538Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.591135 env[1213]: time="2025-05-16T00:52:07.591099756Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:07.591365 env[1213]: time="2025-05-16T00:52:07.591340438Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 16 00:52:07.592636 env[1213]: time="2025-05-16T00:52:07.592611689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 16 00:52:07.593761 env[1213]: time="2025-05-16T00:52:07.593723820Z" level=info msg="CreateContainer within sandbox \"1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 16 00:52:07.602684 env[1213]: time="2025-05-16T00:52:07.602646541Z" level=info msg="CreateContainer within sandbox \"1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8401e686e914e041c8d713e6fae61be1a17f4bef5663fb401c46a34714b9b3f8\"" May 16 00:52:07.603320 env[1213]: time="2025-05-16T00:52:07.603286467Z" level=info msg="StartContainer for \"8401e686e914e041c8d713e6fae61be1a17f4bef5663fb401c46a34714b9b3f8\"" May 16 00:52:07.618264 systemd[1]: Started cri-containerd-8401e686e914e041c8d713e6fae61be1a17f4bef5663fb401c46a34714b9b3f8.scope. May 16 00:52:07.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit: BPF prog-id=187 op=LOAD May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4076 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303165363836653931346530343163386437313365366661653631 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4076 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303165363836653931346530343163386437313365366661653631 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit: BPF prog-id=188 op=LOAD May 16 00:52:07.642000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4076 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303165363836653931346530343163386437313365366661653631 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit: BPF prog-id=189 op=LOAD May 16 00:52:07.642000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4076 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303165363836653931346530343163386437313365366661653631 May 16 00:52:07.642000 audit: BPF prog-id=189 op=UNLOAD May 16 00:52:07.642000 audit: BPF prog-id=188 op=UNLOAD May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:07.642000 audit: BPF prog-id=190 op=LOAD May 16 00:52:07.642000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4076 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:07.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834303165363836653931346530343163386437313365366661653631 May 16 00:52:07.666247 env[1213]: time="2025-05-16T00:52:07.666190883Z" level=info msg="StartContainer for \"8401e686e914e041c8d713e6fae61be1a17f4bef5663fb401c46a34714b9b3f8\" returns successfully" May 16 00:52:08.039000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.039000 audit: BPF prog-id=191 op=LOAD May 16 00:52:08.039000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd793bda8 a2=98 a3=ffffd793bd98 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.039000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.040000 audit: BPF prog-id=191 op=UNLOAD May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit: BPF prog-id=192 op=LOAD May 16 00:52:08.040000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd793ba38 a2=74 a3=95 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.040000 audit: BPF prog-id=192 op=UNLOAD May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.040000 audit: BPF prog-id=193 op=LOAD May 16 00:52:08.040000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd793ba98 a2=94 a3=2 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.040000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.040000 audit: BPF prog-id=193 op=UNLOAD May 16 00:52:08.126000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit: BPF prog-id=194 op=LOAD May 16 00:52:08.126000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd793ba58 a2=40 a3=ffffd793ba88 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.126000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.126000 audit: BPF prog-id=194 op=UNLOAD May 16 00:52:08.126000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.126000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd793bb70 a2=50 a3=0 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.126000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd793bac8 a2=28 a3=ffffd793bbf8 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd793baf8 a2=28 a3=ffffd793bc28 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd793b9a8 a2=28 a3=ffffd793bad8 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd793bb18 a2=28 a3=ffffd793bc48 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd793baf8 a2=28 a3=ffffd793bc28 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd793bae8 a2=28 a3=ffffd793bc18 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd793bb18 a2=28 a3=ffffd793bc48 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd793baf8 a2=28 a3=ffffd793bc28 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd793bb18 a2=28 a3=ffffd793bc48 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd793bae8 a2=28 a3=ffffd793bc18 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd793bb68 a2=28 a3=ffffd793bca8 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd793b8a0 a2=50 a3=0 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit: BPF prog-id=195 op=LOAD May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd793b8a8 a2=94 a3=5 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit: BPF prog-id=195 op=UNLOAD May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd793b9b0 a2=50 a3=0 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd793baf8 a2=4 a3=3 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.136000 audit[4693]: AVC avc: denied { confidentiality } for pid=4693 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:52:08.136000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd793bad8 a2=94 a3=6 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.136000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.137000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { confidentiality } for pid=4693 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:52:08.137000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd793b2a8 a2=94 a3=83 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.137000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.137000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { bpf } for pid=4693 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: AVC avc: denied { perfmon } for pid=4693 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.137000 audit[4693]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd793b2a8 a2=94 a3=83 items=0 ppid=4675 pid=4693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.137000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit: BPF prog-id=196 op=LOAD May 16 00:52:08.153000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe631dad8 a2=98 a3=ffffe631dac8 items=0 ppid=4675 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.153000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:52:08.153000 audit: BPF prog-id=196 op=UNLOAD May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.153000 audit: BPF prog-id=197 op=LOAD May 16 00:52:08.153000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe631d988 a2=74 a3=95 items=0 ppid=4675 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.153000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:52:08.154000 audit: BPF prog-id=197 op=UNLOAD May 16 00:52:08.154000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { perfmon } for pid=4696 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit[4696]: AVC avc: denied { bpf } for pid=4696 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.154000 audit: BPF prog-id=198 op=LOAD May 16 00:52:08.154000 audit[4696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe631d9b8 a2=40 a3=ffffe631d9e8 items=0 ppid=4675 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.154000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:52:08.155000 audit: BPF prog-id=198 op=UNLOAD May 16 00:52:08.235472 systemd-networkd[1040]: vxlan.calico: Link UP May 16 00:52:08.235480 systemd-networkd[1040]: vxlan.calico: Gained carrier May 16 00:52:08.272000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.272000 audit: BPF prog-id=199 op=LOAD May 16 00:52:08.272000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff0655e38 a2=98 a3=fffff0655e28 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.272000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.277000 audit: BPF prog-id=199 op=UNLOAD May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit: BPF prog-id=200 op=LOAD May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff0655b18 a2=74 a3=95 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit: BPF prog-id=200 op=UNLOAD May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit: BPF prog-id=201 op=LOAD May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff0655b78 a2=94 a3=2 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit: BPF prog-id=201 op=UNLOAD May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff0655ba8 a2=28 a3=fffff0655cd8 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff0655bd8 a2=28 a3=fffff0655d08 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff0655a88 a2=28 a3=fffff0655bb8 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff0655bf8 a2=28 a3=fffff0655d28 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff0655bd8 a2=28 a3=fffff0655d08 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff0655bc8 a2=28 a3=fffff0655cf8 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff0655bf8 a2=28 a3=fffff0655d28 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff0655bd8 a2=28 a3=fffff0655d08 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff0655bf8 a2=28 a3=fffff0655d28 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff0655bc8 a2=28 a3=fffff0655cf8 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff0655c48 a2=28 a3=fffff0655d88 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.279000 audit: BPF prog-id=202 op=LOAD May 16 00:52:08.279000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff0655a68 a2=40 a3=fffff0655a98 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.279000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.279000 audit: BPF prog-id=202 op=UNLOAD May 16 00:52:08.280000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffff0655a90 a2=50 a3=0 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.280000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffff0655a90 a2=50 a3=0 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.280000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.280000 audit: BPF prog-id=203 op=LOAD May 16 00:52:08.280000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff06551f8 a2=94 a3=2 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.280000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.282000 audit: BPF prog-id=203 op=UNLOAD May 16 00:52:08.282000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { perfmon } for pid=4722 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit[4722]: AVC avc: denied { bpf } for pid=4722 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.282000 audit: BPF prog-id=204 op=LOAD May 16 00:52:08.282000 audit[4722]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff0655388 a2=94 a3=30 items=0 ppid=4675 pid=4722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.282000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit: BPF prog-id=205 op=LOAD May 16 00:52:08.285000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe2996438 a2=98 a3=ffffe2996428 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.285000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.285000 audit: BPF prog-id=205 op=UNLOAD May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit: BPF prog-id=206 op=LOAD May 16 00:52:08.285000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe29960c8 a2=74 a3=95 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.285000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.285000 audit: BPF prog-id=206 op=UNLOAD May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.285000 audit: BPF prog-id=207 op=LOAD May 16 00:52:08.285000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2996128 a2=94 a3=2 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.285000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.285000 audit: BPF prog-id=207 op=UNLOAD May 16 00:52:08.395000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit: BPF prog-id=208 op=LOAD May 16 00:52:08.395000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe29960e8 a2=40 a3=ffffe2996118 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.395000 audit: BPF prog-id=208 op=UNLOAD May 16 00:52:08.395000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.395000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe2996200 a2=50 a3=0 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.395000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2996158 a2=28 a3=ffffe2996288 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2996188 a2=28 a3=ffffe29962b8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2996038 a2=28 a3=ffffe2996168 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe29961a8 a2=28 a3=ffffe29962d8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2996188 a2=28 a3=ffffe29962b8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2996178 a2=28 a3=ffffe29962a8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe29961a8 a2=28 a3=ffffe29962d8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2996188 a2=28 a3=ffffe29962b8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe29961a8 a2=28 a3=ffffe29962d8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2996178 a2=28 a3=ffffe29962a8 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe29961f8 a2=28 a3=ffffe2996338 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2995f30 a2=50 a3=0 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit: BPF prog-id=209 op=LOAD May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe2995f38 a2=94 a3=5 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit: BPF prog-id=209 op=UNLOAD May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2996040 a2=50 a3=0 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe2996188 a2=4 a3=3 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.405000 audit[4732]: AVC avc: denied { confidentiality } for pid=4732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:52:08.405000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2996168 a2=94 a3=6 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.405000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { confidentiality } for pid=4732 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:52:08.406000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2995938 a2=94 a3=83 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { perfmon } for pid=4732 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2995938 a2=94 a3=83 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2997378 a2=10 a3=ffffe2997468 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2997238 a2=10 a3=ffffe2997328 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe29971a8 a2=10 a3=ffffe2997328 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.406000 audit[4732]: AVC avc: denied { bpf } for pid=4732 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.406000 audit[4732]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe29971a8 a2=10 a3=ffffe2997328 items=0 ppid=4675 pid=4732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.406000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:52:08.416000 audit: BPF prog-id=204 op=UNLOAD May 16 00:52:08.444530 kubelet[1956]: I0516 00:52:08.444502 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:52:08.472000 audit[4751]: NETFILTER_CFG table=filter:111 family=2 entries=14 op=nft_register_rule pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:08.472000 audit[4751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffecd01eb0 a2=0 a3=1 items=0 ppid=2066 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:08.476000 audit[4751]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:08.476000 audit[4751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffecd01eb0 a2=0 a3=1 items=0 ppid=2066 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:08.512000 audit[4765]: NETFILTER_CFG table=mangle:113 family=2 entries=16 op=nft_register_chain pid=4765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:52:08.512000 audit[4765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff1e52950 a2=0 a3=ffff84aecfa8 items=0 ppid=4675 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.512000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:52:08.516000 audit[4763]: NETFILTER_CFG table=raw:114 family=2 entries=21 op=nft_register_chain pid=4763 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:52:08.516000 audit[4763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffc6663090 a2=0 a3=ffff8d157fa8 items=0 ppid=4675 pid=4763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.516000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:52:08.518000 audit[4766]: NETFILTER_CFG table=nat:115 family=2 entries=15 op=nft_register_chain pid=4766 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:52:08.518000 audit[4766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffffc514610 a2=0 a3=ffff91e34fa8 items=0 ppid=4675 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.518000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:52:08.537000 audit[4769]: NETFILTER_CFG table=filter:116 family=2 entries=327 op=nft_register_chain pid=4769 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:52:08.537000 audit[4769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=193476 a0=3 a1=ffffd7ab2b60 a2=0 a3=ffffb411bfa8 items=0 ppid=4675 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.537000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:52:08.691334 env[1213]: time="2025-05-16T00:52:08.691236982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.695350 env[1213]: time="2025-05-16T00:52:08.692660674Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.696733 env[1213]: time="2025-05-16T00:52:08.696682710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.698567 env[1213]: time="2025-05-16T00:52:08.698526847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 16 00:52:08.698805 env[1213]: time="2025-05-16T00:52:08.698779009Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.701329 env[1213]: time="2025-05-16T00:52:08.701297271Z" level=info msg="CreateContainer within sandbox \"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 16 00:52:08.717184 env[1213]: time="2025-05-16T00:52:08.717131452Z" level=info msg="CreateContainer within sandbox \"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"3b227e970d603a613255ba7fde5641bb7681ce497d7d990a186b970e96642115\"" May 16 00:52:08.717777 env[1213]: time="2025-05-16T00:52:08.717740098Z" level=info msg="StartContainer for \"3b227e970d603a613255ba7fde5641bb7681ce497d7d990a186b970e96642115\"" May 16 00:52:08.742213 systemd[1]: Started cri-containerd-3b227e970d603a613255ba7fde5641bb7681ce497d7d990a186b970e96642115.scope. May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4309 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323237653937306436303361363133323535626137666465353634 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit: BPF prog-id=210 op=LOAD May 16 00:52:08.776000 audit[4786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4309 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323237653937306436303361363133323535626137666465353634 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit: BPF prog-id=211 op=LOAD May 16 00:52:08.776000 audit[4786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4309 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323237653937306436303361363133323535626137666465353634 May 16 00:52:08.776000 audit: BPF prog-id=211 op=UNLOAD May 16 00:52:08.776000 audit: BPF prog-id=210 op=UNLOAD May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { perfmon } for pid=4786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit[4786]: AVC avc: denied { bpf } for pid=4786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:08.776000 audit: BPF prog-id=212 op=LOAD May 16 00:52:08.776000 audit[4786]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4309 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:08.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362323237653937306436303361363133323535626137666465353634 May 16 00:52:08.792639 env[1213]: time="2025-05-16T00:52:08.792594605Z" level=info msg="StartContainer for \"3b227e970d603a613255ba7fde5641bb7681ce497d7d990a186b970e96642115\" returns successfully" May 16 00:52:08.793782 env[1213]: time="2025-05-16T00:52:08.793750975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 16 00:52:08.899000 audit[4653]: AVC avc: denied { watch } for pid=4653 comm="apiserver" path="/calico-apiserver-certs/..2025_05_16_00_51_49.293754873/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c491,c818 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c491,c818 tclass=file permissive=0 May 16 00:52:08.899000 audit[4653]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40016dde60 a2=fc6 a3=0 items=0 ppid=4076 pid=4653 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c491,c818 key=(null) May 16 00:52:08.899000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 16 00:52:09.184632 systemd[1]: run-containerd-runc-k8s.io-3b227e970d603a613255ba7fde5641bb7681ce497d7d990a186b970e96642115-runc.2drwOk.mount: Deactivated successfully. May 16 00:52:09.270000 audit[4576]: AVC avc: denied { watch } for pid=4576 comm="apiserver" path="/calico-apiserver-certs/..2025_05_16_00_51_49.1134544234/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c843,c952 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c843,c952 tclass=file permissive=0 May 16 00:52:09.270000 audit[4576]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400169d7a0 a2=fc6 a3=0 items=0 ppid=3724 pid=4576 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c843,c952 key=(null) May 16 00:52:09.270000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 16 00:52:09.294248 kubelet[1956]: I0516 00:52:09.294179 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5b48879cf9-mrx99" podStartSLOduration=27.559488268 podStartE2EDuration="31.294161526s" podCreationTimestamp="2025-05-16 00:51:38 +0000 UTC" firstStartedPulling="2025-05-16 00:52:03.85781915 +0000 UTC m=+41.676942414" lastFinishedPulling="2025-05-16 00:52:07.592492408 +0000 UTC m=+45.411615672" observedRunningTime="2025-05-16 00:52:08.457988663 +0000 UTC m=+46.277111927" watchObservedRunningTime="2025-05-16 00:52:09.294161526 +0000 UTC m=+47.113284790" May 16 00:52:09.447226 kubelet[1956]: I0516 00:52:09.447124 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:52:09.492000 audit[4815]: NETFILTER_CFG table=filter:117 family=2 entries=13 op=nft_register_rule pid=4815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:09.492000 audit[4815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd70441c0 a2=0 a3=1 items=0 ppid=2066 pid=4815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:09.492000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:09.501000 audit[4815]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4815 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:09.501000 audit[4815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffd70441c0 a2=0 a3=1 items=0 ppid=2066 pid=4815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:09.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:09.588460 systemd-networkd[1040]: vxlan.calico: Gained IPv6LL May 16 00:52:10.191554 env[1213]: time="2025-05-16T00:52:10.191503509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.192923 env[1213]: time="2025-05-16T00:52:10.192896241Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.194711 env[1213]: time="2025-05-16T00:52:10.194677816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.195752 env[1213]: time="2025-05-16T00:52:10.195703224Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.196282 env[1213]: time="2025-05-16T00:52:10.196251269Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 16 00:52:10.199197 env[1213]: time="2025-05-16T00:52:10.199165174Z" level=info msg="CreateContainer within sandbox \"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 16 00:52:10.211317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3125512144.mount: Deactivated successfully. May 16 00:52:10.214011 env[1213]: time="2025-05-16T00:52:10.213973339Z" level=info msg="CreateContainer within sandbox \"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d125de5475969b7990ff40222c02b3e2fe73cf113f2ea421350393757bc2bf4f\"" May 16 00:52:10.215678 env[1213]: time="2025-05-16T00:52:10.215645913Z" level=info msg="StartContainer for \"d125de5475969b7990ff40222c02b3e2fe73cf113f2ea421350393757bc2bf4f\"" May 16 00:52:10.238992 systemd[1]: Started cri-containerd-d125de5475969b7990ff40222c02b3e2fe73cf113f2ea421350393757bc2bf4f.scope. May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4309 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323564653534373539363962373939306666343032323263303262 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit: BPF prog-id=213 op=LOAD May 16 00:52:10.258000 audit[4823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4309 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323564653534373539363962373939306666343032323263303262 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit: BPF prog-id=214 op=LOAD May 16 00:52:10.258000 audit[4823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4309 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323564653534373539363962373939306666343032323263303262 May 16 00:52:10.258000 audit: BPF prog-id=214 op=UNLOAD May 16 00:52:10.258000 audit: BPF prog-id=213 op=UNLOAD May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { perfmon } for pid=4823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit[4823]: AVC avc: denied { bpf } for pid=4823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:10.258000 audit: BPF prog-id=215 op=LOAD May 16 00:52:10.258000 audit[4823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4309 pid=4823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:10.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431323564653534373539363962373939306666343032323263303262 May 16 00:52:10.292157 env[1213]: time="2025-05-16T00:52:10.292069598Z" level=info msg="StartContainer for \"d125de5475969b7990ff40222c02b3e2fe73cf113f2ea421350393757bc2bf4f\" returns successfully" May 16 00:52:10.374911 kubelet[1956]: I0516 00:52:10.374811 1956 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 16 00:52:10.376187 kubelet[1956]: I0516 00:52:10.376168 1956 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 16 00:52:11.434292 systemd[1]: Started sshd@9-10.0.0.127:22-10.0.0.1:41260.service. May 16 00:52:11.435886 kernel: kauditd_printk_skb: 725 callbacks suppressed May 16 00:52:11.435977 kernel: audit: type=1130 audit(1747356731.433:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.127:22-10.0.0.1:41260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.127:22-10.0.0.1:41260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.471000 audit[4855]: USER_ACCT pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.472890 sshd[4855]: Accepted publickey for core from 10.0.0.1 port 41260 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:11.475873 kernel: audit: type=1101 audit(1747356731.471:1398): pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.475000 audit[4855]: CRED_ACQ pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.477179 sshd[4855]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:11.480606 kernel: audit: type=1103 audit(1747356731.475:1399): pid=4855 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.480676 kernel: audit: type=1006 audit(1747356731.475:1400): pid=4855 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 16 00:52:11.480697 kernel: audit: type=1300 audit(1747356731.475:1400): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd291bd20 a2=3 a3=1 items=0 ppid=1 pid=4855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:11.475000 audit[4855]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd291bd20 a2=3 a3=1 items=0 ppid=1 pid=4855 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:11.483260 kernel: audit: type=1327 audit(1747356731.475:1400): proctitle=737368643A20636F7265205B707269765D May 16 00:52:11.475000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:11.484329 systemd-logind[1201]: New session 10 of user core. May 16 00:52:11.484456 systemd[1]: Started session-10.scope. May 16 00:52:11.492000 audit[4855]: USER_START pid=4855 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.493000 audit[4857]: CRED_ACQ pid=4857 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.498105 kernel: audit: type=1105 audit(1747356731.492:1401): pid=4855 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.498164 kernel: audit: type=1103 audit(1747356731.493:1402): pid=4857 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.637523 sshd[4855]: pam_unix(sshd:session): session closed for user core May 16 00:52:11.637000 audit[4855]: USER_END pid=4855 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.637000 audit[4855]: CRED_DISP pid=4855 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.641354 systemd[1]: Started sshd@10-10.0.0.127:22-10.0.0.1:41274.service. May 16 00:52:11.642012 systemd[1]: sshd@9-10.0.0.127:22-10.0.0.1:41260.service: Deactivated successfully. May 16 00:52:11.642668 systemd[1]: session-10.scope: Deactivated successfully. May 16 00:52:11.643467 kernel: audit: type=1106 audit(1747356731.637:1403): pid=4855 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.643516 kernel: audit: type=1104 audit(1747356731.637:1404): pid=4855 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.127:22-10.0.0.1:41274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.127:22-10.0.0.1:41260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.644769 systemd-logind[1201]: Session 10 logged out. Waiting for processes to exit. May 16 00:52:11.645591 systemd-logind[1201]: Removed session 10. May 16 00:52:11.672000 audit[4871]: USER_ACCT pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.673270 sshd[4871]: Accepted publickey for core from 10.0.0.1 port 41274 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:11.673000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.673000 audit[4871]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0091ad0 a2=3 a3=1 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:11.673000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:11.674453 sshd[4871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:11.678208 systemd-logind[1201]: New session 11 of user core. May 16 00:52:11.678477 systemd[1]: Started session-11.scope. May 16 00:52:11.681000 audit[4871]: USER_START pid=4871 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.682000 audit[4874]: CRED_ACQ pid=4874 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.833916 sshd[4871]: pam_unix(sshd:session): session closed for user core May 16 00:52:11.834000 audit[4871]: USER_END pid=4871 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.835000 audit[4871]: CRED_DISP pid=4871 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.837673 systemd[1]: Started sshd@11-10.0.0.127:22-10.0.0.1:41286.service. May 16 00:52:11.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.127:22-10.0.0.1:41286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.846233 systemd[1]: sshd@10-10.0.0.127:22-10.0.0.1:41274.service: Deactivated successfully. May 16 00:52:11.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.127:22-10.0.0.1:41274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.847104 systemd[1]: session-11.scope: Deactivated successfully. May 16 00:52:11.847790 systemd-logind[1201]: Session 11 logged out. Waiting for processes to exit. May 16 00:52:11.849716 systemd-logind[1201]: Removed session 11. May 16 00:52:11.870000 audit[4882]: USER_ACCT pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.871267 sshd[4882]: Accepted publickey for core from 10.0.0.1 port 41286 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:11.871000 audit[4882]: CRED_ACQ pid=4882 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.871000 audit[4882]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff93a6f10 a2=3 a3=1 items=0 ppid=1 pid=4882 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:11.871000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:11.872474 sshd[4882]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:11.875591 systemd-logind[1201]: New session 12 of user core. May 16 00:52:11.876411 systemd[1]: Started session-12.scope. May 16 00:52:11.878000 audit[4882]: USER_START pid=4882 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:11.880000 audit[4885]: CRED_ACQ pid=4885 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:12.009601 sshd[4882]: pam_unix(sshd:session): session closed for user core May 16 00:52:12.009000 audit[4882]: USER_END pid=4882 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:12.009000 audit[4882]: CRED_DISP pid=4882 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:12.012337 systemd[1]: session-12.scope: Deactivated successfully. May 16 00:52:12.012934 systemd-logind[1201]: Session 12 logged out. Waiting for processes to exit. May 16 00:52:12.013078 systemd[1]: sshd@11-10.0.0.127:22-10.0.0.1:41286.service: Deactivated successfully. May 16 00:52:12.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.127:22-10.0.0.1:41286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:12.014127 systemd-logind[1201]: Removed session 12. May 16 00:52:12.281774 env[1213]: time="2025-05-16T00:52:12.281662461Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:52:12.297033 kubelet[1956]: I0516 00:52:12.296979 1956 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-vfrqm" podStartSLOduration=24.982805487 podStartE2EDuration="30.296963464s" podCreationTimestamp="2025-05-16 00:51:42 +0000 UTC" firstStartedPulling="2025-05-16 00:52:04.882964739 +0000 UTC m=+42.702087963" lastFinishedPulling="2025-05-16 00:52:10.197122676 +0000 UTC m=+48.016245940" observedRunningTime="2025-05-16 00:52:10.463228724 +0000 UTC m=+48.282351988" watchObservedRunningTime="2025-05-16 00:52:12.296963464 +0000 UTC m=+50.116086728" May 16 00:52:12.430973 env[1213]: time="2025-05-16T00:52:12.430920337Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:52:12.431964 env[1213]: time="2025-05-16T00:52:12.431930905Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:52:12.432191 kubelet[1956]: E0516 00:52:12.432158 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:52:12.432256 kubelet[1956]: E0516 00:52:12.432205 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:52:12.432338 kubelet[1956]: E0516 00:52:12.432306 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:9b5b198180054cbf82bb52eba34561f0,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-p67jd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7784f6c4dd-m552m_calico-system(b7288d17-f2ea-46d6-bdbc-ab977eb53fbe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:52:12.434340 env[1213]: time="2025-05-16T00:52:12.434309644Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:52:12.597917 env[1213]: time="2025-05-16T00:52:12.597822074Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:52:12.598744 env[1213]: time="2025-05-16T00:52:12.598705641Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:52:12.598998 kubelet[1956]: E0516 00:52:12.598960 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:52:12.599124 kubelet[1956]: E0516 00:52:12.599105 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:52:12.599312 kubelet[1956]: E0516 00:52:12.599274 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p67jd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7784f6c4dd-m552m_calico-system(b7288d17-f2ea-46d6-bdbc-ab977eb53fbe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:52:12.600879 kubelet[1956]: E0516 00:52:12.600831 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7784f6c4dd-m552m" podUID="b7288d17-f2ea-46d6-bdbc-ab977eb53fbe" May 16 00:52:17.014057 systemd[1]: Started sshd@12-10.0.0.127:22-10.0.0.1:53626.service. May 16 00:52:17.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.127:22-10.0.0.1:53626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:17.016884 kernel: kauditd_printk_skb: 23 callbacks suppressed May 16 00:52:17.017021 kernel: audit: type=1130 audit(1747356737.013:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.127:22-10.0.0.1:53626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:17.048000 audit[4910]: USER_ACCT pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.049637 sshd[4910]: Accepted publickey for core from 10.0.0.1 port 53626 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:17.051365 sshd[4910]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:17.051877 kernel: audit: type=1101 audit(1747356737.048:1425): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.051916 kernel: audit: type=1103 audit(1747356737.050:1426): pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.050000 audit[4910]: CRED_ACQ pid=4910 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.055472 kernel: audit: type=1006 audit(1747356737.050:1427): pid=4910 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 16 00:52:17.055623 kernel: audit: type=1300 audit(1747356737.050:1427): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb24a370 a2=3 a3=1 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:17.050000 audit[4910]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffb24a370 a2=3 a3=1 items=0 ppid=1 pid=4910 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:17.057708 systemd[1]: Started session-13.scope. May 16 00:52:17.050000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:17.058609 kernel: audit: type=1327 audit(1747356737.050:1427): proctitle=737368643A20636F7265205B707269765D May 16 00:52:17.057908 systemd-logind[1201]: New session 13 of user core. May 16 00:52:17.061000 audit[4910]: USER_START pid=4910 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.062000 audit[4912]: CRED_ACQ pid=4912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.066803 kernel: audit: type=1105 audit(1747356737.061:1428): pid=4910 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.066866 kernel: audit: type=1103 audit(1747356737.062:1429): pid=4912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.182766 sshd[4910]: pam_unix(sshd:session): session closed for user core May 16 00:52:17.182000 audit[4910]: USER_END pid=4910 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.185448 systemd[1]: sshd@12-10.0.0.127:22-10.0.0.1:53626.service: Deactivated successfully. May 16 00:52:17.186316 systemd[1]: session-13.scope: Deactivated successfully. May 16 00:52:17.182000 audit[4910]: CRED_DISP pid=4910 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.186836 systemd-logind[1201]: Session 13 logged out. Waiting for processes to exit. May 16 00:52:17.187608 systemd-logind[1201]: Removed session 13. May 16 00:52:17.188687 kernel: audit: type=1106 audit(1747356737.182:1430): pid=4910 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.188749 kernel: audit: type=1104 audit(1747356737.182:1431): pid=4910 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:17.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.127:22-10.0.0.1:53626 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:19.534000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.534000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=400964f780 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:52:19.534000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.534000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7e a1=400dc3e6c0 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:52:19.534000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:19.534000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:19.548000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.548000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.548000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7d a1=400dc3e6f0 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:52:19.548000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7e a1=400de8d080 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:52:19.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:19.548000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.548000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7f a1=400efb4960 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:52:19.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:19.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:19.548000 audit[1841]: AVC avc: denied { watch } for pid=1841 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.548000 audit[1841]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7f a1=4008635b30 a2=fc6 a3=0 items=0 ppid=1671 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c93,c845 key=(null) May 16 00:52:19.548000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313237002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:19.623000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.623000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000fdd220 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:52:19.623000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:19.623000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:19.623000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011eae40 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:52:19.623000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:20.282121 env[1213]: time="2025-05-16T00:52:20.282076284Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:52:20.448994 env[1213]: time="2025-05-16T00:52:20.448928331Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:52:20.449880 env[1213]: time="2025-05-16T00:52:20.449833017Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:52:20.450086 kubelet[1956]: E0516 00:52:20.450041 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:52:20.450361 kubelet[1956]: E0516 00:52:20.450096 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:52:20.450361 kubelet[1956]: E0516 00:52:20.450237 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zbxj6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-p45jg_calico-system(453d674a-7ed1-42ce-af47-5432d13a4ef8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:52:20.451470 kubelet[1956]: E0516 00:52:20.451423 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:52:22.187630 systemd[1]: Started sshd@13-10.0.0.127:22-10.0.0.1:53642.service. May 16 00:52:22.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.127:22-10.0.0.1:53642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:22.188387 kernel: kauditd_printk_skb: 25 callbacks suppressed May 16 00:52:22.188491 kernel: audit: type=1130 audit(1747356742.186:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.127:22-10.0.0.1:53642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:22.221000 audit[4932]: USER_ACCT pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.222046 sshd[4932]: Accepted publickey for core from 10.0.0.1 port 53642 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:22.223509 sshd[4932]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:22.222000 audit[4932]: CRED_ACQ pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.226256 kernel: audit: type=1101 audit(1747356742.221:1442): pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.226333 kernel: audit: type=1103 audit(1747356742.222:1443): pid=4932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.226364 kernel: audit: type=1006 audit(1747356742.222:1444): pid=4932 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 16 00:52:22.227519 kernel: audit: type=1300 audit(1747356742.222:1444): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd6ba460 a2=3 a3=1 items=0 ppid=1 pid=4932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:22.222000 audit[4932]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffd6ba460 a2=3 a3=1 items=0 ppid=1 pid=4932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:22.229076 systemd[1]: Started session-14.scope. May 16 00:52:22.229389 systemd-logind[1201]: New session 14 of user core. May 16 00:52:22.222000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:22.230535 kernel: audit: type=1327 audit(1747356742.222:1444): proctitle=737368643A20636F7265205B707269765D May 16 00:52:22.232000 audit[4932]: USER_START pid=4932 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.233000 audit[4934]: CRED_ACQ pid=4934 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.237858 kernel: audit: type=1105 audit(1747356742.232:1445): pid=4932 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.237924 kernel: audit: type=1103 audit(1747356742.233:1446): pid=4934 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.258329 env[1213]: time="2025-05-16T00:52:22.258290395Z" level=info msg="StopPodSandbox for \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\"" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.303 [WARNING][4945] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c0163ae-4ad6-4e9f-8ad8-175069a920ab", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d", Pod:"calico-apiserver-5b48879cf9-tgdhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd90a5b390c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.303 [INFO][4945] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.303 [INFO][4945] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" iface="eth0" netns="" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.303 [INFO][4945] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.303 [INFO][4945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.331 [INFO][4964] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.331 [INFO][4964] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.331 [INFO][4964] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.340 [WARNING][4964] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.341 [INFO][4964] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.342 [INFO][4964] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.347399 env[1213]: 2025-05-16 00:52:22.344 [INFO][4945] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.347812 env[1213]: time="2025-05-16T00:52:22.347400067Z" level=info msg="TearDown network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\" successfully" May 16 00:52:22.347812 env[1213]: time="2025-05-16T00:52:22.347427147Z" level=info msg="StopPodSandbox for \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\" returns successfully" May 16 00:52:22.347874 env[1213]: time="2025-05-16T00:52:22.347816070Z" level=info msg="RemovePodSandbox for \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\"" May 16 00:52:22.347901 env[1213]: time="2025-05-16T00:52:22.347844910Z" level=info msg="Forcibly stopping sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\"" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.383 [WARNING][4982] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"5c0163ae-4ad6-4e9f-8ad8-175069a920ab", ResourceVersion:"1158", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a9fa27c5a5b5e273cf33ca413d2f470cb83fd36dfc26e1dc6d08dc0b1e7cb54d", Pod:"calico-apiserver-5b48879cf9-tgdhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibd90a5b390c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.385 [INFO][4982] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.386 [INFO][4982] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" iface="eth0" netns="" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.386 [INFO][4982] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.387 [INFO][4982] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.414 [INFO][4990] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.414 [INFO][4990] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.414 [INFO][4990] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.426 [WARNING][4990] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.426 [INFO][4990] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" HandleID="k8s-pod-network.4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" Workload="localhost-k8s-calico--apiserver--5b48879cf9--tgdhl-eth0" May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.427 [INFO][4990] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.432547 env[1213]: 2025-05-16 00:52:22.430 [INFO][4982] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977" May 16 00:52:22.433550 env[1213]: time="2025-05-16T00:52:22.432573235Z" level=info msg="TearDown network for sandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\" successfully" May 16 00:52:22.435680 env[1213]: time="2025-05-16T00:52:22.435644934Z" level=info msg="RemovePodSandbox \"4ccbc87563b4fe95fd76e7821093c45c217b612e2c1e04e32897f82a07779977\" returns successfully" May 16 00:52:22.436283 env[1213]: time="2025-05-16T00:52:22.436221097Z" level=info msg="StopPodSandbox for \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\"" May 16 00:52:22.440541 sshd[4932]: pam_unix(sshd:session): session closed for user core May 16 00:52:22.441000 audit[4932]: USER_END pid=4932 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.441000 audit[4932]: CRED_DISP pid=4932 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.447520 kernel: audit: type=1106 audit(1747356742.441:1447): pid=4932 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.447642 kernel: audit: type=1104 audit(1747356742.441:1448): pid=4932 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:22.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.127:22-10.0.0.1:53642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:22.446145 systemd[1]: sshd@13-10.0.0.127:22-10.0.0.1:53642.service: Deactivated successfully. May 16 00:52:22.446921 systemd[1]: session-14.scope: Deactivated successfully. May 16 00:52:22.447941 systemd-logind[1201]: Session 14 logged out. Waiting for processes to exit. May 16 00:52:22.449149 systemd-logind[1201]: Removed session 14. May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.494 [WARNING][5010] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"1eea67e7-3525-474d-90c3-d26f6070b8be", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c", Pod:"coredns-7c65d6cfc9-mxsmq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali693514a6bbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.494 [INFO][5010] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.494 [INFO][5010] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" iface="eth0" netns="" May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.494 [INFO][5010] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.494 [INFO][5010] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.512 [INFO][5018] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.512 [INFO][5018] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.512 [INFO][5018] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.520 [WARNING][5018] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.520 [INFO][5018] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.521 [INFO][5018] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.525460 env[1213]: 2025-05-16 00:52:22.523 [INFO][5010] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.525893 env[1213]: time="2025-05-16T00:52:22.525482770Z" level=info msg="TearDown network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\" successfully" May 16 00:52:22.525893 env[1213]: time="2025-05-16T00:52:22.525515051Z" level=info msg="StopPodSandbox for \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\" returns successfully" May 16 00:52:22.526025 env[1213]: time="2025-05-16T00:52:22.525983174Z" level=info msg="RemovePodSandbox for \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\"" May 16 00:52:22.526163 env[1213]: time="2025-05-16T00:52:22.526120014Z" level=info msg="Forcibly stopping sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\"" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.556 [WARNING][5036] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"1eea67e7-3525-474d-90c3-d26f6070b8be", ResourceVersion:"1062", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"ff22f3aa72b03d43e6852b34615322008781554365b97660e73d076be4b2be4c", Pod:"coredns-7c65d6cfc9-mxsmq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali693514a6bbd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.557 [INFO][5036] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.557 [INFO][5036] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" iface="eth0" netns="" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.557 [INFO][5036] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.557 [INFO][5036] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.576 [INFO][5045] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.576 [INFO][5045] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.576 [INFO][5045] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.585 [WARNING][5045] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.585 [INFO][5045] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" HandleID="k8s-pod-network.064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" Workload="localhost-k8s-coredns--7c65d6cfc9--mxsmq-eth0" May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.586 [INFO][5045] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.590333 env[1213]: 2025-05-16 00:52:22.588 [INFO][5036] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9" May 16 00:52:22.590733 env[1213]: time="2025-05-16T00:52:22.590370613Z" level=info msg="TearDown network for sandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\" successfully" May 16 00:52:22.593008 env[1213]: time="2025-05-16T00:52:22.592974149Z" level=info msg="RemovePodSandbox \"064c6e794c0249184cd2fc904cf23a5ceb263e88abf7ac0017b939419cc92fb9\" returns successfully" May 16 00:52:22.593541 env[1213]: time="2025-05-16T00:52:22.593485552Z" level=info msg="StopPodSandbox for \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\"" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.625 [WARNING][5062] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0", GenerateName:"calico-kube-controllers-69c567c48b-", Namespace:"calico-system", SelfLink:"", UID:"d775377f-1cc8-46ad-b81c-271daff33eaa", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c567c48b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099", Pod:"calico-kube-controllers-69c567c48b-pl9jq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib855e75cfc9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.626 [INFO][5062] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.626 [INFO][5062] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" iface="eth0" netns="" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.626 [INFO][5062] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.626 [INFO][5062] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.643 [INFO][5071] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.644 [INFO][5071] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.644 [INFO][5071] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.652 [WARNING][5071] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.652 [INFO][5071] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.653 [INFO][5071] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.656973 env[1213]: 2025-05-16 00:52:22.655 [INFO][5062] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.657556 env[1213]: time="2025-05-16T00:52:22.657005145Z" level=info msg="TearDown network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\" successfully" May 16 00:52:22.657556 env[1213]: time="2025-05-16T00:52:22.657038906Z" level=info msg="StopPodSandbox for \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\" returns successfully" May 16 00:52:22.657807 env[1213]: time="2025-05-16T00:52:22.657778350Z" level=info msg="RemovePodSandbox for \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\"" May 16 00:52:22.657938 env[1213]: time="2025-05-16T00:52:22.657901591Z" level=info msg="Forcibly stopping sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\"" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.689 [WARNING][5088] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0", GenerateName:"calico-kube-controllers-69c567c48b-", Namespace:"calico-system", SelfLink:"", UID:"d775377f-1cc8-46ad-b81c-271daff33eaa", ResourceVersion:"1101", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"69c567c48b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"69b769d73043448392a52045e52dfae7aa969ba1d58126cc9fd8d50cf086f099", Pod:"calico-kube-controllers-69c567c48b-pl9jq", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib855e75cfc9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.689 [INFO][5088] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.689 [INFO][5088] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" iface="eth0" netns="" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.689 [INFO][5088] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.689 [INFO][5088] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.707 [INFO][5097] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.707 [INFO][5097] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.707 [INFO][5097] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.716 [WARNING][5097] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.716 [INFO][5097] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" HandleID="k8s-pod-network.49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" Workload="localhost-k8s-calico--kube--controllers--69c567c48b--pl9jq-eth0" May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.717 [INFO][5097] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.721075 env[1213]: 2025-05-16 00:52:22.719 [INFO][5088] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed" May 16 00:52:22.721581 env[1213]: time="2025-05-16T00:52:22.721530585Z" level=info msg="TearDown network for sandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\" successfully" May 16 00:52:22.724209 env[1213]: time="2025-05-16T00:52:22.724173842Z" level=info msg="RemovePodSandbox \"49d41b2687a0ea8c7f0d337953c77ec2f782d501c10418d0d68e0617b22313ed\" returns successfully" May 16 00:52:22.724809 env[1213]: time="2025-05-16T00:52:22.724777005Z" level=info msg="StopPodSandbox for \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\"" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.757 [WARNING][5114] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"453d674a-7ed1-42ce-af47-5432d13a4ef8", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e", Pod:"goldmane-8f77d7b6c-p45jg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6a86eb45f10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.758 [INFO][5114] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.758 [INFO][5114] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" iface="eth0" netns="" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.758 [INFO][5114] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.758 [INFO][5114] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.776 [INFO][5122] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.776 [INFO][5122] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.776 [INFO][5122] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.784 [WARNING][5122] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.784 [INFO][5122] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.786 [INFO][5122] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.791244 env[1213]: 2025-05-16 00:52:22.788 [INFO][5114] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.791675 env[1213]: time="2025-05-16T00:52:22.791277777Z" level=info msg="TearDown network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\" successfully" May 16 00:52:22.791675 env[1213]: time="2025-05-16T00:52:22.791309098Z" level=info msg="StopPodSandbox for \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\" returns successfully" May 16 00:52:22.791795 env[1213]: time="2025-05-16T00:52:22.791765220Z" level=info msg="RemovePodSandbox for \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\"" May 16 00:52:22.791869 env[1213]: time="2025-05-16T00:52:22.791801861Z" level=info msg="Forcibly stopping sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\"" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.822 [WARNING][5140] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"453d674a-7ed1-42ce-af47-5432d13a4ef8", ResourceVersion:"1244", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1558b9dc182131a4271b5c71d8ded9df28b917d46e29d82ba2b2217675e35f1e", Pod:"goldmane-8f77d7b6c-p45jg", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6a86eb45f10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.822 [INFO][5140] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.822 [INFO][5140] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" iface="eth0" netns="" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.822 [INFO][5140] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.822 [INFO][5140] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.841 [INFO][5149] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.841 [INFO][5149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.841 [INFO][5149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.850 [WARNING][5149] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.850 [INFO][5149] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" HandleID="k8s-pod-network.19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" Workload="localhost-k8s-goldmane--8f77d7b6c--p45jg-eth0" May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.851 [INFO][5149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.854621 env[1213]: 2025-05-16 00:52:22.853 [INFO][5140] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0" May 16 00:52:22.855051 env[1213]: time="2025-05-16T00:52:22.854652370Z" level=info msg="TearDown network for sandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\" successfully" May 16 00:52:22.857751 env[1213]: time="2025-05-16T00:52:22.857720309Z" level=info msg="RemovePodSandbox \"19fe2b5621898bafaa29880a85b99342251f4e4f466a77e9eb00e73caa4f51c0\" returns successfully" May 16 00:52:22.858235 env[1213]: time="2025-05-16T00:52:22.858213032Z" level=info msg="StopPodSandbox for \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\"" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.890 [WARNING][5167] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"8d4db442-957c-4bac-a386-8c53068d9f22", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce", Pod:"coredns-7c65d6cfc9-5kxv9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba02ace6c10", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.890 [INFO][5167] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.890 [INFO][5167] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" iface="eth0" netns="" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.890 [INFO][5167] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.890 [INFO][5167] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.908 [INFO][5176] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.908 [INFO][5176] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.908 [INFO][5176] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.916 [WARNING][5176] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.917 [INFO][5176] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.918 [INFO][5176] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.921761 env[1213]: 2025-05-16 00:52:22.920 [INFO][5167] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.922233 env[1213]: time="2025-05-16T00:52:22.921784306Z" level=info msg="TearDown network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\" successfully" May 16 00:52:22.922233 env[1213]: time="2025-05-16T00:52:22.921815866Z" level=info msg="StopPodSandbox for \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\" returns successfully" May 16 00:52:22.922468 env[1213]: time="2025-05-16T00:52:22.922439790Z" level=info msg="RemovePodSandbox for \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\"" May 16 00:52:22.922585 env[1213]: time="2025-05-16T00:52:22.922550031Z" level=info msg="Forcibly stopping sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\"" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.953 [WARNING][5194] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"8d4db442-957c-4bac-a386-8c53068d9f22", ResourceVersion:"1094", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f674b715b3073ff87f92d2192e9eae46117db8a8314dbaf6c793eefc2f0d81ce", Pod:"coredns-7c65d6cfc9-5kxv9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliba02ace6c10", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.953 [INFO][5194] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.953 [INFO][5194] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" iface="eth0" netns="" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.953 [INFO][5194] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.953 [INFO][5194] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.971 [INFO][5203] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.971 [INFO][5203] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.971 [INFO][5203] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.980 [WARNING][5203] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.980 [INFO][5203] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" HandleID="k8s-pod-network.6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" Workload="localhost-k8s-coredns--7c65d6cfc9--5kxv9-eth0" May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.982 [INFO][5203] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:22.985553 env[1213]: 2025-05-16 00:52:22.983 [INFO][5194] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73" May 16 00:52:22.986801 env[1213]: time="2025-05-16T00:52:22.985523141Z" level=info msg="TearDown network for sandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\" successfully" May 16 00:52:22.989483 env[1213]: time="2025-05-16T00:52:22.989454245Z" level=info msg="RemovePodSandbox \"6b52b43486912b24b8cab99bd082e1e6e057a8a10399026df5696b69c2327a73\" returns successfully" May 16 00:52:22.989994 env[1213]: time="2025-05-16T00:52:22.989964689Z" level=info msg="StopPodSandbox for \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\"" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.019 [WARNING][5221] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" WorkloadEndpoint="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.019 [INFO][5221] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.019 [INFO][5221] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" iface="eth0" netns="" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.019 [INFO][5221] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.019 [INFO][5221] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.036 [INFO][5230] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.036 [INFO][5230] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.036 [INFO][5230] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.044 [WARNING][5230] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.044 [INFO][5230] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.046 [INFO][5230] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:23.052152 env[1213]: 2025-05-16 00:52:23.047 [INFO][5221] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.052521 env[1213]: time="2025-05-16T00:52:23.052173586Z" level=info msg="TearDown network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\" successfully" May 16 00:52:23.052521 env[1213]: time="2025-05-16T00:52:23.052201226Z" level=info msg="StopPodSandbox for \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\" returns successfully" May 16 00:52:23.052724 env[1213]: time="2025-05-16T00:52:23.052667389Z" level=info msg="RemovePodSandbox for \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\"" May 16 00:52:23.052767 env[1213]: time="2025-05-16T00:52:23.052728710Z" level=info msg="Forcibly stopping sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\"" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.084 [WARNING][5248] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" WorkloadEndpoint="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.084 [INFO][5248] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.084 [INFO][5248] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" iface="eth0" netns="" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.084 [INFO][5248] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.084 [INFO][5248] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.101 [INFO][5257] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.101 [INFO][5257] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.101 [INFO][5257] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.109 [WARNING][5257] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.109 [INFO][5257] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" HandleID="k8s-pod-network.a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" Workload="localhost-k8s-whisker--699f56df8b--n4lw7-eth0" May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.111 [INFO][5257] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:23.115449 env[1213]: 2025-05-16 00:52:23.113 [INFO][5248] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034" May 16 00:52:23.115819 env[1213]: time="2025-05-16T00:52:23.115473609Z" level=info msg="TearDown network for sandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\" successfully" May 16 00:52:23.118147 env[1213]: time="2025-05-16T00:52:23.118113545Z" level=info msg="RemovePodSandbox \"a33066c1dc459eb90add3f0f8301b9fab9d77fdffa5b652c628dfeb66ce81034\" returns successfully" May 16 00:52:23.118612 env[1213]: time="2025-05-16T00:52:23.118576508Z" level=info msg="StopPodSandbox for \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\"" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.149 [WARNING][5276] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vfrqm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"561a2113-fd27-44d9-9df0-c2cfce17e3bf", ResourceVersion:"1182", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a", Pod:"csi-node-driver-vfrqm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali231e70a2b67", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.149 [INFO][5276] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.150 [INFO][5276] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" iface="eth0" netns="" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.150 [INFO][5276] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.150 [INFO][5276] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.166 [INFO][5285] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.166 [INFO][5285] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.166 [INFO][5285] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.174 [WARNING][5285] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.174 [INFO][5285] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.176 [INFO][5285] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:23.179433 env[1213]: 2025-05-16 00:52:23.177 [INFO][5276] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.179841 env[1213]: time="2025-05-16T00:52:23.179467756Z" level=info msg="TearDown network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\" successfully" May 16 00:52:23.179841 env[1213]: time="2025-05-16T00:52:23.179497396Z" level=info msg="StopPodSandbox for \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\" returns successfully" May 16 00:52:23.180071 env[1213]: time="2025-05-16T00:52:23.180032959Z" level=info msg="RemovePodSandbox for \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\"" May 16 00:52:23.180106 env[1213]: time="2025-05-16T00:52:23.180068919Z" level=info msg="Forcibly stopping sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\"" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.212 [WARNING][5303] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vfrqm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"561a2113-fd27-44d9-9df0-c2cfce17e3bf", ResourceVersion:"1182", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 42, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f12c5a09cd32eb1998a5cbba80197159ef5d957777e2c6e8c900924d8843c19a", Pod:"csi-node-driver-vfrqm", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali231e70a2b67", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.212 [INFO][5303] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.212 [INFO][5303] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" iface="eth0" netns="" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.212 [INFO][5303] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.212 [INFO][5303] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.229 [INFO][5312] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.229 [INFO][5312] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.230 [INFO][5312] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.238 [WARNING][5312] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.238 [INFO][5312] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" HandleID="k8s-pod-network.7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" Workload="localhost-k8s-csi--node--driver--vfrqm-eth0" May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.240 [INFO][5312] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:23.243895 env[1213]: 2025-05-16 00:52:23.242 [INFO][5303] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578" May 16 00:52:23.245193 env[1213]: time="2025-05-16T00:52:23.243867185Z" level=info msg="TearDown network for sandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\" successfully" May 16 00:52:23.248285 env[1213]: time="2025-05-16T00:52:23.248251292Z" level=info msg="RemovePodSandbox \"7a877e98f74d6cfdd100344cc712b6f7516a9adcc681f95d67d903aa87a82578\" returns successfully" May 16 00:52:23.248706 env[1213]: time="2025-05-16T00:52:23.248679214Z" level=info msg="StopPodSandbox for \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\"" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.279 [WARNING][5330] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"14889221-6fbd-4a5c-ae89-57afe5cc81db", ResourceVersion:"1147", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a", Pod:"calico-apiserver-5b48879cf9-mrx99", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7eff8c61b1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.279 [INFO][5330] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.279 [INFO][5330] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" iface="eth0" netns="" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.279 [INFO][5330] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.279 [INFO][5330] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.300 [INFO][5339] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.300 [INFO][5339] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.300 [INFO][5339] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.309 [WARNING][5339] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.309 [INFO][5339] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.311 [INFO][5339] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:23.314223 env[1213]: 2025-05-16 00:52:23.312 [INFO][5330] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.314895 env[1213]: time="2025-05-16T00:52:23.314837374Z" level=info msg="TearDown network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\" successfully" May 16 00:52:23.314959 env[1213]: time="2025-05-16T00:52:23.314944615Z" level=info msg="StopPodSandbox for \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\" returns successfully" May 16 00:52:23.315444 env[1213]: time="2025-05-16T00:52:23.315419258Z" level=info msg="RemovePodSandbox for \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\"" May 16 00:52:23.315566 env[1213]: time="2025-05-16T00:52:23.315529178Z" level=info msg="Forcibly stopping sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\"" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.345 [WARNING][5357] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0", GenerateName:"calico-apiserver-5b48879cf9-", Namespace:"calico-apiserver", SelfLink:"", UID:"14889221-6fbd-4a5c-ae89-57afe5cc81db", ResourceVersion:"1147", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 51, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5b48879cf9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1d1cb033271564d32a812a6d0126bcbcf88b2aace3a814c6966b196e5792538a", Pod:"calico-apiserver-5b48879cf9-mrx99", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7eff8c61b1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.346 [INFO][5357] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.346 [INFO][5357] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" iface="eth0" netns="" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.346 [INFO][5357] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.346 [INFO][5357] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.362 [INFO][5366] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.362 [INFO][5366] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.362 [INFO][5366] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.370 [WARNING][5366] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.370 [INFO][5366] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" HandleID="k8s-pod-network.5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" Workload="localhost-k8s-calico--apiserver--5b48879cf9--mrx99-eth0" May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.372 [INFO][5366] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:52:23.375259 env[1213]: 2025-05-16 00:52:23.373 [INFO][5357] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e" May 16 00:52:23.375773 env[1213]: time="2025-05-16T00:52:23.375742142Z" level=info msg="TearDown network for sandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\" successfully" May 16 00:52:23.378525 env[1213]: time="2025-05-16T00:52:23.378498239Z" level=info msg="RemovePodSandbox \"5733b9b87514ef14c10f098ac061b1a6f92b564756a8026b559af0d2261bdc0e\" returns successfully" May 16 00:52:23.577273 kubelet[1956]: I0516 00:52:23.577234 1956 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:52:23.611000 audit[5374]: NETFILTER_CFG table=filter:119 family=2 entries=12 op=nft_register_rule pid=5374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:23.611000 audit[5374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff6d7cd70 a2=0 a3=1 items=0 ppid=2066 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:23.611000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:23.619000 audit[5374]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=5374 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:23.619000 audit[5374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff6d7cd70 a2=0 a3=1 items=0 ppid=2066 pid=5374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:23.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:24.280215 kubelet[1956]: E0516 00:52:24.280156 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-7784f6c4dd-m552m" podUID="b7288d17-f2ea-46d6-bdbc-ab977eb53fbe" May 16 00:52:26.451000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:26.451000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:26.451000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000b68840 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:52:26.451000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:26.451000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bef2a0 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:52:26.451000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:26.452000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:26.452000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fdd740 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:52:26.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:26.453000 audit[1832]: AVC avc: denied { watch } for pid=1832 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:26.453000 audit[1832]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001731600 a2=fc6 a3=0 items=0 ppid=1675 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c383,c490 key=(null) May 16 00:52:26.453000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:27.445926 systemd[1]: Started sshd@14-10.0.0.127:22-10.0.0.1:42138.service. May 16 00:52:27.446974 kernel: kauditd_printk_skb: 19 callbacks suppressed May 16 00:52:27.447042 kernel: audit: type=1130 audit(1747356747.445:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.127:22-10.0.0.1:42138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:27.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.127:22-10.0.0.1:42138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:27.488000 audit[5376]: USER_ACCT pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.489166 sshd[5376]: Accepted publickey for core from 10.0.0.1 port 42138 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:27.492124 kernel: audit: type=1101 audit(1747356747.488:1457): pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.493372 kernel: audit: type=1103 audit(1747356747.491:1458): pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.491000 audit[5376]: CRED_ACQ pid=5376 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.492895 sshd[5376]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:27.496658 kernel: audit: type=1006 audit(1747356747.491:1459): pid=5376 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 16 00:52:27.497752 kernel: audit: type=1300 audit(1747356747.491:1459): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe76927f0 a2=3 a3=1 items=0 ppid=1 pid=5376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:27.491000 audit[5376]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe76927f0 a2=3 a3=1 items=0 ppid=1 pid=5376 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:27.498632 kernel: audit: type=1327 audit(1747356747.491:1459): proctitle=737368643A20636F7265205B707269765D May 16 00:52:27.491000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:27.499655 systemd-logind[1201]: New session 15 of user core. May 16 00:52:27.500442 systemd[1]: Started session-15.scope. May 16 00:52:27.507000 audit[5376]: USER_START pid=5376 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.509000 audit[5378]: CRED_ACQ pid=5378 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.513068 kernel: audit: type=1105 audit(1747356747.507:1460): pid=5376 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.513148 kernel: audit: type=1103 audit(1747356747.509:1461): pid=5378 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.647178 sshd[5376]: pam_unix(sshd:session): session closed for user core May 16 00:52:27.647000 audit[5376]: USER_END pid=5376 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.647000 audit[5376]: CRED_DISP pid=5376 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.649779 systemd[1]: session-15.scope: Deactivated successfully. May 16 00:52:27.650427 systemd[1]: sshd@14-10.0.0.127:22-10.0.0.1:42138.service: Deactivated successfully. May 16 00:52:27.652130 systemd-logind[1201]: Session 15 logged out. Waiting for processes to exit. May 16 00:52:27.652919 systemd-logind[1201]: Removed session 15. May 16 00:52:27.653470 kernel: audit: type=1106 audit(1747356747.647:1462): pid=5376 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.653538 kernel: audit: type=1104 audit(1747356747.647:1463): pid=5376 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:27.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.127:22-10.0.0.1:42138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:32.278881 kubelet[1956]: E0516 00:52:32.278811 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:52:32.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.127:22-10.0.0.1:55852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:32.652145 systemd[1]: Started sshd@15-10.0.0.127:22-10.0.0.1:55852.service. May 16 00:52:32.654953 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:52:32.655044 kernel: audit: type=1130 audit(1747356752.651:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.127:22-10.0.0.1:55852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:32.687000 audit[5424]: USER_ACCT pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.688513 sshd[5424]: Accepted publickey for core from 10.0.0.1 port 55852 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:32.688000 audit[5424]: CRED_ACQ pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.690868 sshd[5424]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:32.692854 kernel: audit: type=1101 audit(1747356752.687:1466): pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.692967 kernel: audit: type=1103 audit(1747356752.688:1467): pid=5424 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.693002 kernel: audit: type=1006 audit(1747356752.688:1468): pid=5424 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 16 00:52:32.694241 kernel: audit: type=1300 audit(1747356752.688:1468): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3b8e110 a2=3 a3=1 items=0 ppid=1 pid=5424 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:32.688000 audit[5424]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff3b8e110 a2=3 a3=1 items=0 ppid=1 pid=5424 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:32.694742 systemd-logind[1201]: New session 16 of user core. May 16 00:52:32.694982 systemd[1]: Started session-16.scope. May 16 00:52:32.688000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:32.697420 kernel: audit: type=1327 audit(1747356752.688:1468): proctitle=737368643A20636F7265205B707269765D May 16 00:52:32.698000 audit[5424]: USER_START pid=5424 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.699000 audit[5426]: CRED_ACQ pid=5426 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.703870 kernel: audit: type=1105 audit(1747356752.698:1469): pid=5424 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.703921 kernel: audit: type=1103 audit(1747356752.699:1470): pid=5426 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.843274 sshd[5424]: pam_unix(sshd:session): session closed for user core May 16 00:52:32.843000 audit[5424]: USER_END pid=5424 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.843000 audit[5424]: CRED_DISP pid=5424 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.848963 systemd[1]: sshd@15-10.0.0.127:22-10.0.0.1:55852.service: Deactivated successfully. May 16 00:52:32.849403 kernel: audit: type=1106 audit(1747356752.843:1471): pid=5424 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.849453 kernel: audit: type=1104 audit(1747356752.843:1472): pid=5424 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.127:22-10.0.0.1:55852 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:32.849648 systemd[1]: session-16.scope: Deactivated successfully. May 16 00:52:32.850396 systemd-logind[1201]: Session 16 logged out. Waiting for processes to exit. May 16 00:52:32.851773 systemd[1]: Started sshd@16-10.0.0.127:22-10.0.0.1:55868.service. May 16 00:52:32.851000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.127:22-10.0.0.1:55868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:32.852583 systemd-logind[1201]: Removed session 16. May 16 00:52:32.883000 audit[5438]: USER_ACCT pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.884671 sshd[5438]: Accepted publickey for core from 10.0.0.1 port 55868 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:32.884000 audit[5438]: CRED_ACQ pid=5438 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.884000 audit[5438]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeae4a4e0 a2=3 a3=1 items=0 ppid=1 pid=5438 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:32.884000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:32.886269 sshd[5438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:32.889799 systemd-logind[1201]: New session 17 of user core. May 16 00:52:32.890665 systemd[1]: Started session-17.scope. May 16 00:52:32.893000 audit[5438]: USER_START pid=5438 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:32.894000 audit[5440]: CRED_ACQ pid=5440 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:33.120761 sshd[5438]: pam_unix(sshd:session): session closed for user core May 16 00:52:33.121000 audit[5438]: USER_END pid=5438 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:33.121000 audit[5438]: CRED_DISP pid=5438 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:33.124620 systemd[1]: Started sshd@17-10.0.0.127:22-10.0.0.1:55880.service. May 16 00:52:33.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.127:22-10.0.0.1:55880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:33.125219 systemd[1]: sshd@16-10.0.0.127:22-10.0.0.1:55868.service: Deactivated successfully. May 16 00:52:33.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.127:22-10.0.0.1:55868 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:33.126084 systemd[1]: session-17.scope: Deactivated successfully. May 16 00:52:33.126654 systemd-logind[1201]: Session 17 logged out. Waiting for processes to exit. May 16 00:52:33.127410 systemd-logind[1201]: Removed session 17. May 16 00:52:33.158000 audit[5449]: USER_ACCT pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:33.159754 sshd[5449]: Accepted publickey for core from 10.0.0.1 port 55880 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:33.159000 audit[5449]: CRED_ACQ pid=5449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:33.159000 audit[5449]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0e5ed00 a2=3 a3=1 items=0 ppid=1 pid=5449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:33.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:33.160908 sshd[5449]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:33.163893 systemd-logind[1201]: New session 18 of user core. May 16 00:52:33.164670 systemd[1]: Started session-18.scope. May 16 00:52:33.167000 audit[5449]: USER_START pid=5449 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:33.168000 audit[5452]: CRED_ACQ pid=5452 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:34.801000 audit[5464]: NETFILTER_CFG table=filter:121 family=2 entries=24 op=nft_register_rule pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:34.801000 audit[5464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffed227620 a2=0 a3=1 items=0 ppid=2066 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:34.801000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:34.807000 audit[5464]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:34.807000 audit[5464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffed227620 a2=0 a3=1 items=0 ppid=2066 pid=5464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:34.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:34.816486 sshd[5449]: pam_unix(sshd:session): session closed for user core May 16 00:52:34.816000 audit[5449]: USER_END pid=5449 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:34.816000 audit[5449]: CRED_DISP pid=5449 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:34.819977 systemd[1]: Started sshd@18-10.0.0.127:22-10.0.0.1:55882.service. May 16 00:52:34.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.127:22-10.0.0.1:55882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:34.820558 systemd[1]: sshd@17-10.0.0.127:22-10.0.0.1:55880.service: Deactivated successfully. May 16 00:52:34.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.127:22-10.0.0.1:55880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:34.821268 systemd[1]: session-18.scope: Deactivated successfully. May 16 00:52:34.821904 systemd-logind[1201]: Session 18 logged out. Waiting for processes to exit. May 16 00:52:34.823671 systemd-logind[1201]: Removed session 18. May 16 00:52:34.828000 audit[5469]: NETFILTER_CFG table=filter:123 family=2 entries=36 op=nft_register_rule pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:34.828000 audit[5469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=fffffc10f1f0 a2=0 a3=1 items=0 ppid=2066 pid=5469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:34.828000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:34.837000 audit[5469]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5469 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:34.837000 audit[5469]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffc10f1f0 a2=0 a3=1 items=0 ppid=2066 pid=5469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:34.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:34.862000 audit[5466]: USER_ACCT pid=5466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:34.863804 sshd[5466]: Accepted publickey for core from 10.0.0.1 port 55882 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:34.863000 audit[5466]: CRED_ACQ pid=5466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:34.863000 audit[5466]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8f6e7a0 a2=3 a3=1 items=0 ppid=1 pid=5466 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:34.863000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:34.865124 sshd[5466]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:34.868724 systemd-logind[1201]: New session 19 of user core. May 16 00:52:34.869534 systemd[1]: Started session-19.scope. May 16 00:52:34.872000 audit[5466]: USER_START pid=5466 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:34.873000 audit[5471]: CRED_ACQ pid=5471 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.228466 sshd[5466]: pam_unix(sshd:session): session closed for user core May 16 00:52:35.229000 audit[5466]: USER_END pid=5466 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.229000 audit[5466]: CRED_DISP pid=5466 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.231892 systemd[1]: Started sshd@19-10.0.0.127:22-10.0.0.1:55898.service. May 16 00:52:35.232483 systemd[1]: sshd@18-10.0.0.127:22-10.0.0.1:55882.service: Deactivated successfully. May 16 00:52:35.233199 systemd[1]: session-19.scope: Deactivated successfully. May 16 00:52:35.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.127:22-10.0.0.1:55898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:35.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.127:22-10.0.0.1:55882 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:35.234011 systemd-logind[1201]: Session 19 logged out. Waiting for processes to exit. May 16 00:52:35.235103 systemd-logind[1201]: Removed session 19. May 16 00:52:35.255569 systemd[1]: run-containerd-runc-k8s.io-6ee309482597e5e987856e4752ae9847512480e1106a59629b1bec0c3eff9ba9-runc.YT0DnA.mount: Deactivated successfully. May 16 00:52:35.271000 audit[5479]: USER_ACCT pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.273016 sshd[5479]: Accepted publickey for core from 10.0.0.1 port 55898 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:35.273000 audit[5479]: CRED_ACQ pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.273000 audit[5479]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0130390 a2=3 a3=1 items=0 ppid=1 pid=5479 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:35.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:35.275805 sshd[5479]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:35.279338 systemd-logind[1201]: New session 20 of user core. May 16 00:52:35.280182 systemd[1]: Started session-20.scope. May 16 00:52:35.282000 audit[5479]: USER_START pid=5479 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.284000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.416056 sshd[5479]: pam_unix(sshd:session): session closed for user core May 16 00:52:35.416000 audit[5479]: USER_END pid=5479 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.416000 audit[5479]: CRED_DISP pid=5479 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:35.418606 systemd[1]: sshd@19-10.0.0.127:22-10.0.0.1:55898.service: Deactivated successfully. May 16 00:52:35.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.127:22-10.0.0.1:55898 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:35.419388 systemd[1]: session-20.scope: Deactivated successfully. May 16 00:52:35.419966 systemd-logind[1201]: Session 20 logged out. Waiting for processes to exit. May 16 00:52:35.420581 systemd-logind[1201]: Removed session 20. May 16 00:52:36.279275 env[1213]: time="2025-05-16T00:52:36.279218732Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:52:36.431592 env[1213]: time="2025-05-16T00:52:36.431508411Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:52:36.432569 env[1213]: time="2025-05-16T00:52:36.432523655Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:52:36.433004 kubelet[1956]: E0516 00:52:36.432748 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:52:36.433004 kubelet[1956]: E0516 00:52:36.432801 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:52:36.436186 kubelet[1956]: E0516 00:52:36.433248 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:9b5b198180054cbf82bb52eba34561f0,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-p67jd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7784f6c4dd-m552m_calico-system(b7288d17-f2ea-46d6-bdbc-ab977eb53fbe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:52:36.436769 env[1213]: time="2025-05-16T00:52:36.435368108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:52:36.599238 env[1213]: time="2025-05-16T00:52:36.599155597Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:52:36.603790 env[1213]: time="2025-05-16T00:52:36.603738538Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:52:36.604012 kubelet[1956]: E0516 00:52:36.603962 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:52:36.604078 kubelet[1956]: E0516 00:52:36.604020 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:52:36.604215 kubelet[1956]: E0516 00:52:36.604160 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-p67jd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-7784f6c4dd-m552m_calico-system(b7288d17-f2ea-46d6-bdbc-ab977eb53fbe): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:52:36.606181 kubelet[1956]: E0516 00:52:36.606117 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-7784f6c4dd-m552m" podUID="b7288d17-f2ea-46d6-bdbc-ab977eb53fbe" May 16 00:52:39.277641 kubelet[1956]: E0516 00:52:39.277609 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:39.679000 audit[5516]: NETFILTER_CFG table=filter:125 family=2 entries=24 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:39.681299 kernel: kauditd_printk_skb: 57 callbacks suppressed May 16 00:52:39.681366 kernel: audit: type=1325 audit(1747356759.679:1514): table=filter:125 family=2 entries=24 op=nft_register_rule pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:39.679000 audit[5516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd8fac030 a2=0 a3=1 items=0 ppid=2066 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.685988 kernel: audit: type=1300 audit(1747356759.679:1514): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd8fac030 a2=0 a3=1 items=0 ppid=2066 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.686036 kernel: audit: type=1327 audit(1747356759.679:1514): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:39.679000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:39.689000 audit[5516]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:39.689000 audit[5516]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd8fac030 a2=0 a3=1 items=0 ppid=2066 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.695505 kernel: audit: type=1325 audit(1747356759.689:1515): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5516 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:39.695700 kernel: audit: type=1300 audit(1747356759.689:1515): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd8fac030 a2=0 a3=1 items=0 ppid=2066 pid=5516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.695752 kernel: audit: type=1327 audit(1747356759.689:1515): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:39.689000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:40.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.127:22-10.0.0.1:55904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:40.420609 systemd[1]: Started sshd@20-10.0.0.127:22-10.0.0.1:55904.service. May 16 00:52:40.423890 kernel: audit: type=1130 audit(1747356760.419:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.127:22-10.0.0.1:55904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:40.456000 audit[5539]: USER_ACCT pid=5539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.457946 sshd[5539]: Accepted publickey for core from 10.0.0.1 port 55904 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:40.459608 sshd[5539]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:40.458000 audit[5539]: CRED_ACQ pid=5539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.462361 kernel: audit: type=1101 audit(1747356760.456:1517): pid=5539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.462419 kernel: audit: type=1103 audit(1747356760.458:1518): pid=5539 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.464103 kernel: audit: type=1006 audit(1747356760.458:1519): pid=5539 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 16 00:52:40.458000 audit[5539]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd20a8040 a2=3 a3=1 items=0 ppid=1 pid=5539 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:40.458000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:40.466295 systemd-logind[1201]: New session 21 of user core. May 16 00:52:40.467170 systemd[1]: Started session-21.scope. May 16 00:52:40.469000 audit[5539]: USER_START pid=5539 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.470000 audit[5541]: CRED_ACQ pid=5541 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.649687 sshd[5539]: pam_unix(sshd:session): session closed for user core May 16 00:52:40.649000 audit[5539]: USER_END pid=5539 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.649000 audit[5539]: CRED_DISP pid=5539 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:40.652327 systemd[1]: session-21.scope: Deactivated successfully. May 16 00:52:40.652914 systemd-logind[1201]: Session 21 logged out. Waiting for processes to exit. May 16 00:52:40.653117 systemd[1]: sshd@20-10.0.0.127:22-10.0.0.1:55904.service: Deactivated successfully. May 16 00:52:40.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.127:22-10.0.0.1:55904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:40.654137 systemd-logind[1201]: Removed session 21. May 16 00:52:43.278632 env[1213]: time="2025-05-16T00:52:43.278571119Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:52:43.423968 env[1213]: time="2025-05-16T00:52:43.423904876Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:52:43.424795 env[1213]: time="2025-05-16T00:52:43.424763880Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:52:43.425042 kubelet[1956]: E0516 00:52:43.424999 1956 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:52:43.425343 kubelet[1956]: E0516 00:52:43.425321 1956 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:52:43.425574 kubelet[1956]: E0516 00:52:43.425529 1956 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-zbxj6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-p45jg_calico-system(453d674a-7ed1-42ce-af47-5432d13a4ef8): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:52:43.426864 kubelet[1956]: E0516 00:52:43.426827 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:52:45.654216 systemd[1]: Started sshd@21-10.0.0.127:22-10.0.0.1:33220.service. May 16 00:52:45.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.127:22-10.0.0.1:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:45.657842 kernel: kauditd_printk_skb: 7 callbacks suppressed May 16 00:52:45.657927 kernel: audit: type=1130 audit(1747356765.653:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.127:22-10.0.0.1:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:45.689000 audit[5553]: USER_ACCT pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.691320 sshd[5553]: Accepted publickey for core from 10.0.0.1 port 33220 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:45.692847 sshd[5553]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:45.691000 audit[5553]: CRED_ACQ pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.696937 kernel: audit: type=1101 audit(1747356765.689:1526): pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.697012 kernel: audit: type=1103 audit(1747356765.691:1527): pid=5553 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.698588 kernel: audit: type=1006 audit(1747356765.691:1528): pid=5553 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 16 00:52:45.698650 kernel: audit: type=1300 audit(1747356765.691:1528): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff056fac0 a2=3 a3=1 items=0 ppid=1 pid=5553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:45.691000 audit[5553]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff056fac0 a2=3 a3=1 items=0 ppid=1 pid=5553 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:45.691000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:45.709875 kernel: audit: type=1327 audit(1747356765.691:1528): proctitle=737368643A20636F7265205B707269765D May 16 00:52:45.721416 systemd-logind[1201]: New session 22 of user core. May 16 00:52:45.722054 systemd[1]: Started session-22.scope. May 16 00:52:45.725000 audit[5553]: USER_START pid=5553 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.728000 audit[5555]: CRED_ACQ pid=5555 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.731571 kernel: audit: type=1105 audit(1747356765.725:1529): pid=5553 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.731620 kernel: audit: type=1103 audit(1747356765.728:1530): pid=5555 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.895796 sshd[5553]: pam_unix(sshd:session): session closed for user core May 16 00:52:45.895000 audit[5553]: USER_END pid=5553 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.896000 audit[5553]: CRED_DISP pid=5553 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.900192 systemd[1]: sshd@21-10.0.0.127:22-10.0.0.1:33220.service: Deactivated successfully. May 16 00:52:45.901030 systemd[1]: session-22.scope: Deactivated successfully. May 16 00:52:45.901864 kernel: audit: type=1106 audit(1747356765.895:1531): pid=5553 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.901940 kernel: audit: type=1104 audit(1747356765.896:1532): pid=5553 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.127:22-10.0.0.1:33220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:45.901941 systemd-logind[1201]: Session 22 logged out. Waiting for processes to exit. May 16 00:52:45.903160 systemd-logind[1201]: Removed session 22. May 16 00:52:50.901097 systemd[1]: Started sshd@22-10.0.0.127:22-10.0.0.1:33234.service. May 16 00:52:50.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.127:22-10.0.0.1:33234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:50.902262 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:52:50.902332 kernel: audit: type=1130 audit(1747356770.900:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.127:22-10.0.0.1:33234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:50.936000 audit[5574]: USER_ACCT pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:50.937928 sshd[5574]: Accepted publickey for core from 10.0.0.1 port 33234 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:50.939722 sshd[5574]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:50.938000 audit[5574]: CRED_ACQ pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:50.942527 kernel: audit: type=1101 audit(1747356770.936:1535): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:50.942599 kernel: audit: type=1103 audit(1747356770.938:1536): pid=5574 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:50.942622 kernel: audit: type=1006 audit(1747356770.938:1537): pid=5574 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 16 00:52:50.938000 audit[5574]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6114b20 a2=3 a3=1 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.946536 kernel: audit: type=1300 audit(1747356770.938:1537): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd6114b20 a2=3 a3=1 items=0 ppid=1 pid=5574 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.938000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:50.947545 kernel: audit: type=1327 audit(1747356770.938:1537): proctitle=737368643A20636F7265205B707269765D May 16 00:52:50.949798 systemd-logind[1201]: New session 23 of user core. May 16 00:52:50.950236 systemd[1]: Started session-23.scope. May 16 00:52:50.955000 audit[5574]: USER_START pid=5574 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:50.957000 audit[5576]: CRED_ACQ pid=5576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:50.961548 kernel: audit: type=1105 audit(1747356770.955:1538): pid=5574 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:50.961600 kernel: audit: type=1103 audit(1747356770.957:1539): pid=5576 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:51.088330 sshd[5574]: pam_unix(sshd:session): session closed for user core May 16 00:52:51.088000 audit[5574]: USER_END pid=5574 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:51.091526 systemd[1]: sshd@22-10.0.0.127:22-10.0.0.1:33234.service: Deactivated successfully. May 16 00:52:51.091753 systemd-logind[1201]: Session 23 logged out. Waiting for processes to exit. May 16 00:52:51.092282 systemd[1]: session-23.scope: Deactivated successfully. May 16 00:52:51.088000 audit[5574]: CRED_DISP pid=5574 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:51.093026 systemd-logind[1201]: Removed session 23. May 16 00:52:51.094542 kernel: audit: type=1106 audit(1747356771.088:1540): pid=5574 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:51.094607 kernel: audit: type=1104 audit(1747356771.088:1541): pid=5574 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:51.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.127:22-10.0.0.1:33234 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:51.279469 kubelet[1956]: E0516 00:52:51.279303 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-7784f6c4dd-m552m" podUID="b7288d17-f2ea-46d6-bdbc-ab977eb53fbe" May 16 00:52:52.278074 kubelet[1956]: E0516 00:52:52.278040 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:54.278213 kubelet[1956]: E0516 00:52:54.278176 1956 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:56.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.127:22-10.0.0.1:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:56.093178 systemd[1]: Started sshd@23-10.0.0.127:22-10.0.0.1:46908.service. May 16 00:52:56.095995 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:52:56.096066 kernel: audit: type=1130 audit(1747356776.092:1543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.127:22-10.0.0.1:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:56.131000 audit[5588]: USER_ACCT pid=5588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.133054 sshd[5588]: Accepted publickey for core from 10.0.0.1 port 46908 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:56.134236 sshd[5588]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:56.133000 audit[5588]: CRED_ACQ pid=5588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.137314 kernel: audit: type=1101 audit(1747356776.131:1544): pid=5588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.137379 kernel: audit: type=1103 audit(1747356776.133:1545): pid=5588 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.137405 kernel: audit: type=1006 audit(1747356776.133:1546): pid=5588 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 16 00:52:56.138388 systemd-logind[1201]: New session 24 of user core. May 16 00:52:56.138922 kernel: audit: type=1300 audit(1747356776.133:1546): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6a1ac50 a2=3 a3=1 items=0 ppid=1 pid=5588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:56.133000 audit[5588]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6a1ac50 a2=3 a3=1 items=0 ppid=1 pid=5588 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:56.138845 systemd[1]: Started session-24.scope. May 16 00:52:56.133000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:56.141878 kernel: audit: type=1327 audit(1747356776.133:1546): proctitle=737368643A20636F7265205B707269765D May 16 00:52:56.142000 audit[5588]: USER_START pid=5588 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.144000 audit[5590]: CRED_ACQ pid=5590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.149567 kernel: audit: type=1105 audit(1747356776.142:1547): pid=5588 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.149623 kernel: audit: type=1103 audit(1747356776.144:1548): pid=5590 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.277353 sshd[5588]: pam_unix(sshd:session): session closed for user core May 16 00:52:56.280207 kubelet[1956]: E0516 00:52:56.279891 1956 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-p45jg" podUID="453d674a-7ed1-42ce-af47-5432d13a4ef8" May 16 00:52:56.281000 audit[5588]: USER_END pid=5588 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.283000 audit[5588]: CRED_DISP pid=5588 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.285454 systemd-logind[1201]: Session 24 logged out. Waiting for processes to exit. May 16 00:52:56.286304 systemd[1]: sshd@23-10.0.0.127:22-10.0.0.1:46908.service: Deactivated successfully. May 16 00:52:56.287110 systemd[1]: session-24.scope: Deactivated successfully. May 16 00:52:56.287244 kernel: audit: type=1106 audit(1747356776.281:1549): pid=5588 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.287283 kernel: audit: type=1104 audit(1747356776.283:1550): pid=5588 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:56.287633 systemd-logind[1201]: Removed session 24. May 16 00:52:56.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.127:22-10.0.0.1:46908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'