May 16 00:28:28.730949 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 16 00:28:28.730975 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 23:21:39 -00 2025 May 16 00:28:28.730984 kernel: efi: EFI v2.70 by EDK II May 16 00:28:28.730989 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 16 00:28:28.730997 kernel: random: crng init done May 16 00:28:28.731002 kernel: ACPI: Early table checksum verification disabled May 16 00:28:28.731009 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 16 00:28:28.731016 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 16 00:28:28.731021 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731027 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731032 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731037 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731042 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731048 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731056 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731062 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731067 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:28:28.731073 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 16 00:28:28.731079 kernel: NUMA: Failed to initialise from firmware May 16 00:28:28.731084 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:28:28.731090 kernel: NUMA: NODE_DATA [mem 0xdcb09900-0xdcb0efff] May 16 00:28:28.731096 kernel: Zone ranges: May 16 00:28:28.731101 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:28:28.731108 kernel: DMA32 empty May 16 00:28:28.731114 kernel: Normal empty May 16 00:28:28.731119 kernel: Movable zone start for each node May 16 00:28:28.731124 kernel: Early memory node ranges May 16 00:28:28.731130 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 16 00:28:28.731136 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 16 00:28:28.731141 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 16 00:28:28.731147 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 16 00:28:28.731152 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 16 00:28:28.731158 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 16 00:28:28.731164 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 16 00:28:28.731170 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:28:28.731177 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 16 00:28:28.731183 kernel: psci: probing for conduit method from ACPI. May 16 00:28:28.731188 kernel: psci: PSCIv1.1 detected in firmware. May 16 00:28:28.731200 kernel: psci: Using standard PSCI v0.2 function IDs May 16 00:28:28.731206 kernel: psci: Trusted OS migration not required May 16 00:28:28.731214 kernel: psci: SMC Calling Convention v1.1 May 16 00:28:28.731221 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 16 00:28:28.731228 kernel: ACPI: SRAT not present May 16 00:28:28.731235 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 16 00:28:28.731241 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 16 00:28:28.731247 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 16 00:28:28.731253 kernel: Detected PIPT I-cache on CPU0 May 16 00:28:28.731260 kernel: CPU features: detected: GIC system register CPU interface May 16 00:28:28.731266 kernel: CPU features: detected: Hardware dirty bit management May 16 00:28:28.731272 kernel: CPU features: detected: Spectre-v4 May 16 00:28:28.731278 kernel: CPU features: detected: Spectre-BHB May 16 00:28:28.731285 kernel: CPU features: kernel page table isolation forced ON by KASLR May 16 00:28:28.731291 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 16 00:28:28.731297 kernel: CPU features: detected: ARM erratum 1418040 May 16 00:28:28.731303 kernel: CPU features: detected: SSBS not fully self-synchronizing May 16 00:28:28.731309 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 16 00:28:28.731315 kernel: Policy zone: DMA May 16 00:28:28.731322 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=2d88e96fdc9dc9b028836e57c250f3fd2abd3e6490e27ecbf72d8b216e3efce8 May 16 00:28:28.731328 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 16 00:28:28.731334 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 16 00:28:28.731341 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 16 00:28:28.731346 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 16 00:28:28.731354 kernel: Memory: 2457332K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114956K reserved, 0K cma-reserved) May 16 00:28:28.731360 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 16 00:28:28.731366 kernel: trace event string verifier disabled May 16 00:28:28.731372 kernel: rcu: Preemptible hierarchical RCU implementation. May 16 00:28:28.731380 kernel: rcu: RCU event tracing is enabled. May 16 00:28:28.731395 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 16 00:28:28.731402 kernel: Trampoline variant of Tasks RCU enabled. May 16 00:28:28.731408 kernel: Tracing variant of Tasks RCU enabled. May 16 00:28:28.731414 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 16 00:28:28.731420 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 16 00:28:28.731426 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 16 00:28:28.731433 kernel: GICv3: 256 SPIs implemented May 16 00:28:28.731439 kernel: GICv3: 0 Extended SPIs implemented May 16 00:28:28.731445 kernel: GICv3: Distributor has no Range Selector support May 16 00:28:28.731451 kernel: Root IRQ handler: gic_handle_irq May 16 00:28:28.731457 kernel: GICv3: 16 PPIs implemented May 16 00:28:28.731463 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 16 00:28:28.731469 kernel: ACPI: SRAT not present May 16 00:28:28.731475 kernel: ITS [mem 0x08080000-0x0809ffff] May 16 00:28:28.731481 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 16 00:28:28.731487 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 16 00:28:28.731493 kernel: GICv3: using LPI property table @0x00000000400d0000 May 16 00:28:28.731499 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 16 00:28:28.731506 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:28:28.731512 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 16 00:28:28.731518 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 16 00:28:28.731525 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 16 00:28:28.731531 kernel: arm-pv: using stolen time PV May 16 00:28:28.731537 kernel: Console: colour dummy device 80x25 May 16 00:28:28.731543 kernel: ACPI: Core revision 20210730 May 16 00:28:28.731550 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 16 00:28:28.731556 kernel: pid_max: default: 32768 minimum: 301 May 16 00:28:28.731562 kernel: LSM: Security Framework initializing May 16 00:28:28.731570 kernel: SELinux: Initializing. May 16 00:28:28.731576 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 16 00:28:28.731582 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 16 00:28:28.731589 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 16 00:28:28.731595 kernel: rcu: Hierarchical SRCU implementation. May 16 00:28:28.731601 kernel: Platform MSI: ITS@0x8080000 domain created May 16 00:28:28.731607 kernel: PCI/MSI: ITS@0x8080000 domain created May 16 00:28:28.731614 kernel: Remapping and enabling EFI services. May 16 00:28:28.731620 kernel: smp: Bringing up secondary CPUs ... May 16 00:28:28.731627 kernel: Detected PIPT I-cache on CPU1 May 16 00:28:28.731633 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 16 00:28:28.731640 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 16 00:28:28.731646 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:28:28.731652 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 16 00:28:28.731659 kernel: Detected PIPT I-cache on CPU2 May 16 00:28:28.731665 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 16 00:28:28.731671 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 16 00:28:28.731678 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:28:28.731684 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 16 00:28:28.731691 kernel: Detected PIPT I-cache on CPU3 May 16 00:28:28.731697 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 16 00:28:28.731703 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 16 00:28:28.731710 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:28:28.731720 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 16 00:28:28.731728 kernel: smp: Brought up 1 node, 4 CPUs May 16 00:28:28.731734 kernel: SMP: Total of 4 processors activated. May 16 00:28:28.731741 kernel: CPU features: detected: 32-bit EL0 Support May 16 00:28:28.731747 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 16 00:28:28.731754 kernel: CPU features: detected: Common not Private translations May 16 00:28:28.731760 kernel: CPU features: detected: CRC32 instructions May 16 00:28:28.731767 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 16 00:28:28.731774 kernel: CPU features: detected: LSE atomic instructions May 16 00:28:28.731781 kernel: CPU features: detected: Privileged Access Never May 16 00:28:28.731787 kernel: CPU features: detected: RAS Extension Support May 16 00:28:28.731794 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 16 00:28:28.731802 kernel: CPU: All CPU(s) started at EL1 May 16 00:28:28.731817 kernel: alternatives: patching kernel code May 16 00:28:28.731825 kernel: devtmpfs: initialized May 16 00:28:28.731832 kernel: KASLR enabled May 16 00:28:28.731839 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 16 00:28:28.731846 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 16 00:28:28.731852 kernel: pinctrl core: initialized pinctrl subsystem May 16 00:28:28.731859 kernel: SMBIOS 3.0.0 present. May 16 00:28:28.731865 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 16 00:28:28.731872 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 16 00:28:28.731881 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 16 00:28:28.731888 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 16 00:28:28.731895 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 16 00:28:28.731901 kernel: audit: initializing netlink subsys (disabled) May 16 00:28:28.731908 kernel: audit: type=2000 audit(0.050:1): state=initialized audit_enabled=0 res=1 May 16 00:28:28.731915 kernel: thermal_sys: Registered thermal governor 'step_wise' May 16 00:28:28.731921 kernel: cpuidle: using governor menu May 16 00:28:28.731928 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 16 00:28:28.731934 kernel: ASID allocator initialised with 32768 entries May 16 00:28:28.731942 kernel: ACPI: bus type PCI registered May 16 00:28:28.731949 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 16 00:28:28.731956 kernel: Serial: AMBA PL011 UART driver May 16 00:28:28.731962 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 16 00:28:28.731969 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 16 00:28:28.731976 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 16 00:28:28.731982 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 16 00:28:28.731989 kernel: cryptd: max_cpu_qlen set to 1000 May 16 00:28:28.731995 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 16 00:28:28.732003 kernel: ACPI: Added _OSI(Module Device) May 16 00:28:28.732010 kernel: ACPI: Added _OSI(Processor Device) May 16 00:28:28.732016 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 16 00:28:28.732023 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 16 00:28:28.732029 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 16 00:28:28.732036 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 16 00:28:28.732042 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 16 00:28:28.732049 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 16 00:28:28.732056 kernel: ACPI: Interpreter enabled May 16 00:28:28.732064 kernel: ACPI: Using GIC for interrupt routing May 16 00:28:28.732070 kernel: ACPI: MCFG table detected, 1 entries May 16 00:28:28.732077 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 16 00:28:28.732084 kernel: printk: console [ttyAMA0] enabled May 16 00:28:28.732090 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 16 00:28:28.732225 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 16 00:28:28.732293 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 16 00:28:28.732355 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 16 00:28:28.732416 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 16 00:28:28.732475 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 16 00:28:28.732484 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 16 00:28:28.732490 kernel: PCI host bridge to bus 0000:00 May 16 00:28:28.732558 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 16 00:28:28.732613 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 16 00:28:28.732667 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 16 00:28:28.732725 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 16 00:28:28.732799 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 16 00:28:28.732894 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 16 00:28:28.732961 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 16 00:28:28.733026 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 16 00:28:28.733089 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 16 00:28:28.733153 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 16 00:28:28.733223 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 16 00:28:28.733287 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 16 00:28:28.733356 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 16 00:28:28.733411 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 16 00:28:28.733465 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 16 00:28:28.733474 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 16 00:28:28.733483 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 16 00:28:28.733489 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 16 00:28:28.733496 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 16 00:28:28.733503 kernel: iommu: Default domain type: Translated May 16 00:28:28.733510 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 16 00:28:28.733516 kernel: vgaarb: loaded May 16 00:28:28.733523 kernel: pps_core: LinuxPPS API ver. 1 registered May 16 00:28:28.733530 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 16 00:28:28.733536 kernel: PTP clock support registered May 16 00:28:28.733543 kernel: Registered efivars operations May 16 00:28:28.733551 kernel: clocksource: Switched to clocksource arch_sys_counter May 16 00:28:28.733558 kernel: VFS: Disk quotas dquot_6.6.0 May 16 00:28:28.733565 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 16 00:28:28.733571 kernel: pnp: PnP ACPI init May 16 00:28:28.733643 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 16 00:28:28.733652 kernel: pnp: PnP ACPI: found 1 devices May 16 00:28:28.733659 kernel: NET: Registered PF_INET protocol family May 16 00:28:28.733666 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 16 00:28:28.733674 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 16 00:28:28.733681 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 16 00:28:28.733688 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 16 00:28:28.733695 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 16 00:28:28.733701 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 16 00:28:28.733708 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 16 00:28:28.733715 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 16 00:28:28.733721 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 16 00:28:28.733728 kernel: PCI: CLS 0 bytes, default 64 May 16 00:28:28.733736 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 16 00:28:28.733742 kernel: kvm [1]: HYP mode not available May 16 00:28:28.733749 kernel: Initialise system trusted keyrings May 16 00:28:28.733755 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 16 00:28:28.733762 kernel: Key type asymmetric registered May 16 00:28:28.733768 kernel: Asymmetric key parser 'x509' registered May 16 00:28:28.733774 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 16 00:28:28.733781 kernel: io scheduler mq-deadline registered May 16 00:28:28.733789 kernel: io scheduler kyber registered May 16 00:28:28.733797 kernel: io scheduler bfq registered May 16 00:28:28.733837 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 16 00:28:28.733878 kernel: ACPI: button: Power Button [PWRB] May 16 00:28:28.733885 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 16 00:28:28.733958 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 16 00:28:28.733968 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 16 00:28:28.733975 kernel: thunder_xcv, ver 1.0 May 16 00:28:28.733982 kernel: thunder_bgx, ver 1.0 May 16 00:28:28.733988 kernel: nicpf, ver 1.0 May 16 00:28:28.733997 kernel: nicvf, ver 1.0 May 16 00:28:28.734066 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 16 00:28:28.734120 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-16T00:28:28 UTC (1747355308) May 16 00:28:28.734129 kernel: hid: raw HID events driver (C) Jiri Kosina May 16 00:28:28.734135 kernel: NET: Registered PF_INET6 protocol family May 16 00:28:28.734142 kernel: Segment Routing with IPv6 May 16 00:28:28.734149 kernel: In-situ OAM (IOAM) with IPv6 May 16 00:28:28.734155 kernel: NET: Registered PF_PACKET protocol family May 16 00:28:28.734164 kernel: Key type dns_resolver registered May 16 00:28:28.734170 kernel: registered taskstats version 1 May 16 00:28:28.734177 kernel: Loading compiled-in X.509 certificates May 16 00:28:28.734184 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 2793d535c1de6f1789b22ef06bd5666144f4eeb2' May 16 00:28:28.734191 kernel: Key type .fscrypt registered May 16 00:28:28.734204 kernel: Key type fscrypt-provisioning registered May 16 00:28:28.734211 kernel: ima: No TPM chip found, activating TPM-bypass! May 16 00:28:28.734218 kernel: ima: Allocated hash algorithm: sha1 May 16 00:28:28.734225 kernel: ima: No architecture policies found May 16 00:28:28.734233 kernel: clk: Disabling unused clocks May 16 00:28:28.734240 kernel: Freeing unused kernel memory: 36480K May 16 00:28:28.734246 kernel: Run /init as init process May 16 00:28:28.734253 kernel: with arguments: May 16 00:28:28.734259 kernel: /init May 16 00:28:28.734265 kernel: with environment: May 16 00:28:28.734272 kernel: HOME=/ May 16 00:28:28.734278 kernel: TERM=linux May 16 00:28:28.734284 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 16 00:28:28.734295 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 16 00:28:28.734303 systemd[1]: Detected virtualization kvm. May 16 00:28:28.734310 systemd[1]: Detected architecture arm64. May 16 00:28:28.734317 systemd[1]: Running in initrd. May 16 00:28:28.734324 systemd[1]: No hostname configured, using default hostname. May 16 00:28:28.734331 systemd[1]: Hostname set to . May 16 00:28:28.734338 systemd[1]: Initializing machine ID from VM UUID. May 16 00:28:28.734347 systemd[1]: Queued start job for default target initrd.target. May 16 00:28:28.734354 systemd[1]: Started systemd-ask-password-console.path. May 16 00:28:28.734361 systemd[1]: Reached target cryptsetup.target. May 16 00:28:28.734367 systemd[1]: Reached target paths.target. May 16 00:28:28.734374 systemd[1]: Reached target slices.target. May 16 00:28:28.734381 systemd[1]: Reached target swap.target. May 16 00:28:28.734388 systemd[1]: Reached target timers.target. May 16 00:28:28.734395 systemd[1]: Listening on iscsid.socket. May 16 00:28:28.734404 systemd[1]: Listening on iscsiuio.socket. May 16 00:28:28.734411 systemd[1]: Listening on systemd-journald-audit.socket. May 16 00:28:28.734418 systemd[1]: Listening on systemd-journald-dev-log.socket. May 16 00:28:28.734425 systemd[1]: Listening on systemd-journald.socket. May 16 00:28:28.734432 systemd[1]: Listening on systemd-networkd.socket. May 16 00:28:28.734440 systemd[1]: Listening on systemd-udevd-control.socket. May 16 00:28:28.734446 systemd[1]: Listening on systemd-udevd-kernel.socket. May 16 00:28:28.734453 systemd[1]: Reached target sockets.target. May 16 00:28:28.734462 systemd[1]: Starting kmod-static-nodes.service... May 16 00:28:28.734469 systemd[1]: Finished network-cleanup.service. May 16 00:28:28.734476 systemd[1]: Starting systemd-fsck-usr.service... May 16 00:28:28.734483 systemd[1]: Starting systemd-journald.service... May 16 00:28:28.734490 systemd[1]: Starting systemd-modules-load.service... May 16 00:28:28.734497 systemd[1]: Starting systemd-resolved.service... May 16 00:28:28.734503 systemd[1]: Starting systemd-vconsole-setup.service... May 16 00:28:28.734511 systemd[1]: Finished kmod-static-nodes.service. May 16 00:28:28.734518 systemd[1]: Finished systemd-fsck-usr.service. May 16 00:28:28.734526 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 16 00:28:28.734533 systemd[1]: Finished systemd-vconsole-setup.service. May 16 00:28:28.734540 systemd[1]: Starting dracut-cmdline-ask.service... May 16 00:28:28.734551 systemd-journald[290]: Journal started May 16 00:28:28.734593 systemd-journald[290]: Runtime Journal (/run/log/journal/3af638d7b0a24855869b6653c478ec26) is 6.0M, max 48.7M, 42.6M free. May 16 00:28:28.726902 systemd-modules-load[291]: Inserted module 'overlay' May 16 00:28:28.736120 systemd[1]: Started systemd-journald.service. May 16 00:28:28.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.738812 kernel: audit: type=1130 audit(1747355308.735:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.746700 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 16 00:28:28.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.750827 kernel: audit: type=1130 audit(1747355308.747:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.753524 systemd[1]: Finished dracut-cmdline-ask.service. May 16 00:28:28.757913 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 16 00:28:28.757934 kernel: audit: type=1130 audit(1747355308.754:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.757944 kernel: Bridge firewalling registered May 16 00:28:28.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.755031 systemd[1]: Starting dracut-cmdline.service... May 16 00:28:28.756277 systemd-resolved[292]: Positive Trust Anchors: May 16 00:28:28.756284 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 16 00:28:28.756312 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 16 00:28:28.757009 systemd-modules-load[291]: Inserted module 'br_netfilter' May 16 00:28:28.760528 systemd-resolved[292]: Defaulting to hostname 'linux'. May 16 00:28:28.771907 kernel: audit: type=1130 audit(1747355308.768:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.771930 kernel: SCSI subsystem initialized May 16 00:28:28.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.761842 systemd[1]: Started systemd-resolved.service. May 16 00:28:28.768271 systemd[1]: Reached target nss-lookup.target. May 16 00:28:28.774585 dracut-cmdline[309]: dracut-dracut-053 May 16 00:28:28.776912 dracut-cmdline[309]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=2d88e96fdc9dc9b028836e57c250f3fd2abd3e6490e27ecbf72d8b216e3efce8 May 16 00:28:28.782481 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 16 00:28:28.782502 kernel: device-mapper: uevent: version 1.0.3 May 16 00:28:28.782511 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 16 00:28:28.785433 systemd-modules-load[291]: Inserted module 'dm_multipath' May 16 00:28:28.786308 systemd[1]: Finished systemd-modules-load.service. May 16 00:28:28.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.788464 systemd[1]: Starting systemd-sysctl.service... May 16 00:28:28.791240 kernel: audit: type=1130 audit(1747355308.786:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.797802 systemd[1]: Finished systemd-sysctl.service. May 16 00:28:28.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.800830 kernel: audit: type=1130 audit(1747355308.797:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.843833 kernel: Loading iSCSI transport class v2.0-870. May 16 00:28:28.857839 kernel: iscsi: registered transport (tcp) May 16 00:28:28.873863 kernel: iscsi: registered transport (qla4xxx) May 16 00:28:28.873905 kernel: QLogic iSCSI HBA Driver May 16 00:28:28.909994 systemd[1]: Finished dracut-cmdline.service. May 16 00:28:28.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.911420 systemd[1]: Starting dracut-pre-udev.service... May 16 00:28:28.914061 kernel: audit: type=1130 audit(1747355308.909:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:28.955836 kernel: raid6: neonx8 gen() 13538 MB/s May 16 00:28:28.972848 kernel: raid6: neonx8 xor() 10779 MB/s May 16 00:28:28.989850 kernel: raid6: neonx4 gen() 13359 MB/s May 16 00:28:29.006859 kernel: raid6: neonx4 xor() 11063 MB/s May 16 00:28:29.023830 kernel: raid6: neonx2 gen() 12849 MB/s May 16 00:28:29.040845 kernel: raid6: neonx2 xor() 10394 MB/s May 16 00:28:29.057846 kernel: raid6: neonx1 gen() 10576 MB/s May 16 00:28:29.074849 kernel: raid6: neonx1 xor() 8706 MB/s May 16 00:28:29.091829 kernel: raid6: int64x8 gen() 6203 MB/s May 16 00:28:29.108839 kernel: raid6: int64x8 xor() 3541 MB/s May 16 00:28:29.125844 kernel: raid6: int64x4 gen() 7177 MB/s May 16 00:28:29.142823 kernel: raid6: int64x4 xor() 3831 MB/s May 16 00:28:29.159823 kernel: raid6: int64x2 gen() 6137 MB/s May 16 00:28:29.176822 kernel: raid6: int64x2 xor() 3309 MB/s May 16 00:28:29.193831 kernel: raid6: int64x1 gen() 5034 MB/s May 16 00:28:29.211127 kernel: raid6: int64x1 xor() 2645 MB/s May 16 00:28:29.211144 kernel: raid6: using algorithm neonx8 gen() 13538 MB/s May 16 00:28:29.211163 kernel: raid6: .... xor() 10779 MB/s, rmw enabled May 16 00:28:29.211171 kernel: raid6: using neon recovery algorithm May 16 00:28:29.224113 kernel: xor: measuring software checksum speed May 16 00:28:29.224150 kernel: 8regs : 17213 MB/sec May 16 00:28:29.225151 kernel: 32regs : 20167 MB/sec May 16 00:28:29.225162 kernel: arm64_neon : 27804 MB/sec May 16 00:28:29.225171 kernel: xor: using function: arm64_neon (27804 MB/sec) May 16 00:28:29.284838 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 16 00:28:29.295665 systemd[1]: Finished dracut-pre-udev.service. May 16 00:28:29.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:29.297341 systemd[1]: Starting systemd-udevd.service... May 16 00:28:29.300540 kernel: audit: type=1130 audit(1747355309.295:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:29.300560 kernel: audit: type=1334 audit(1747355309.296:10): prog-id=7 op=LOAD May 16 00:28:29.296000 audit: BPF prog-id=7 op=LOAD May 16 00:28:29.296000 audit: BPF prog-id=8 op=LOAD May 16 00:28:29.310356 systemd-udevd[492]: Using default interface naming scheme 'v252'. May 16 00:28:29.313908 systemd[1]: Started systemd-udevd.service. May 16 00:28:29.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:29.316242 systemd[1]: Starting dracut-pre-trigger.service... May 16 00:28:29.328084 dracut-pre-trigger[502]: rd.md=0: removing MD RAID activation May 16 00:28:29.357496 systemd[1]: Finished dracut-pre-trigger.service. May 16 00:28:29.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:29.358990 systemd[1]: Starting systemd-udev-trigger.service... May 16 00:28:29.393395 systemd[1]: Finished systemd-udev-trigger.service. May 16 00:28:29.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:29.422255 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 16 00:28:29.427127 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 16 00:28:29.427142 kernel: GPT:9289727 != 19775487 May 16 00:28:29.427150 kernel: GPT:Alternate GPT header not at the end of the disk. May 16 00:28:29.427159 kernel: GPT:9289727 != 19775487 May 16 00:28:29.427166 kernel: GPT: Use GNU Parted to correct GPT errors. May 16 00:28:29.427174 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:28:29.445835 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (545) May 16 00:28:29.447702 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 16 00:28:29.451064 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 16 00:28:29.457307 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 16 00:28:29.458098 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 16 00:28:29.462778 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 16 00:28:29.464229 systemd[1]: Starting disk-uuid.service... May 16 00:28:29.504162 disk-uuid[563]: Primary Header is updated. May 16 00:28:29.504162 disk-uuid[563]: Secondary Entries is updated. May 16 00:28:29.504162 disk-uuid[563]: Secondary Header is updated. May 16 00:28:29.508822 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:28:30.518161 disk-uuid[564]: The operation has completed successfully. May 16 00:28:30.519498 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:28:30.543748 systemd[1]: disk-uuid.service: Deactivated successfully. May 16 00:28:30.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.543886 systemd[1]: Finished disk-uuid.service. May 16 00:28:30.545368 systemd[1]: Starting verity-setup.service... May 16 00:28:30.562819 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 16 00:28:30.588611 systemd[1]: Found device dev-mapper-usr.device. May 16 00:28:30.590217 systemd[1]: Mounting sysusr-usr.mount... May 16 00:28:30.591047 systemd[1]: Finished verity-setup.service. May 16 00:28:30.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.642822 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 16 00:28:30.643168 systemd[1]: Mounted sysusr-usr.mount. May 16 00:28:30.644037 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 16 00:28:30.644855 systemd[1]: Starting ignition-setup.service... May 16 00:28:30.646752 systemd[1]: Starting parse-ip-for-networkd.service... May 16 00:28:30.654935 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 16 00:28:30.654982 kernel: BTRFS info (device vda6): using free space tree May 16 00:28:30.654992 kernel: BTRFS info (device vda6): has skinny extents May 16 00:28:30.663849 systemd[1]: mnt-oem.mount: Deactivated successfully. May 16 00:28:30.670163 systemd[1]: Finished ignition-setup.service. May 16 00:28:30.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.671985 systemd[1]: Starting ignition-fetch-offline.service... May 16 00:28:30.740108 systemd[1]: Finished parse-ip-for-networkd.service. May 16 00:28:30.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.740000 audit: BPF prog-id=9 op=LOAD May 16 00:28:30.742243 systemd[1]: Starting systemd-networkd.service... May 16 00:28:30.765667 systemd-networkd[740]: lo: Link UP May 16 00:28:30.765678 systemd-networkd[740]: lo: Gained carrier May 16 00:28:30.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.766288 systemd-networkd[740]: Enumeration completed May 16 00:28:30.766420 systemd[1]: Started systemd-networkd.service. May 16 00:28:30.766639 systemd-networkd[740]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 16 00:28:30.767411 systemd[1]: Reached target network.target. May 16 00:28:30.768416 systemd-networkd[740]: eth0: Link UP May 16 00:28:30.768420 systemd-networkd[740]: eth0: Gained carrier May 16 00:28:30.769679 systemd[1]: Starting iscsiuio.service... May 16 00:28:30.778016 ignition[646]: Ignition 2.14.0 May 16 00:28:30.778025 ignition[646]: Stage: fetch-offline May 16 00:28:30.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.779217 systemd[1]: Started iscsiuio.service. May 16 00:28:30.778068 ignition[646]: no configs at "/usr/lib/ignition/base.d" May 16 00:28:30.781125 systemd[1]: Starting iscsid.service... May 16 00:28:30.778077 ignition[646]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:28:30.785009 iscsid[747]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 16 00:28:30.785009 iscsid[747]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 16 00:28:30.785009 iscsid[747]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 16 00:28:30.785009 iscsid[747]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 16 00:28:30.785009 iscsid[747]: If using hardware iscsi like qla4xxx this message can be ignored. May 16 00:28:30.785009 iscsid[747]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 16 00:28:30.785009 iscsid[747]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 16 00:28:30.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.778226 ignition[646]: parsed url from cmdline: "" May 16 00:28:30.788001 systemd[1]: Started iscsid.service. May 16 00:28:30.778230 ignition[646]: no config URL provided May 16 00:28:30.789252 systemd-networkd[740]: eth0: DHCPv4 address 10.0.0.9/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 16 00:28:30.778234 ignition[646]: reading system config file "/usr/lib/ignition/user.ign" May 16 00:28:30.791969 systemd[1]: Starting dracut-initqueue.service... May 16 00:28:30.778242 ignition[646]: no config at "/usr/lib/ignition/user.ign" May 16 00:28:30.778264 ignition[646]: op(1): [started] loading QEMU firmware config module May 16 00:28:30.778269 ignition[646]: op(1): executing: "modprobe" "qemu_fw_cfg" May 16 00:28:30.796473 ignition[646]: op(1): [finished] loading QEMU firmware config module May 16 00:28:30.803203 systemd[1]: Finished dracut-initqueue.service. May 16 00:28:30.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.804530 systemd[1]: Reached target remote-fs-pre.target. May 16 00:28:30.805851 systemd[1]: Reached target remote-cryptsetup.target. May 16 00:28:30.807417 systemd[1]: Reached target remote-fs.target. May 16 00:28:30.809631 systemd[1]: Starting dracut-pre-mount.service... May 16 00:28:30.817737 systemd[1]: Finished dracut-pre-mount.service. May 16 00:28:30.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.849784 ignition[646]: parsing config with SHA512: 563e37369dc2919475af46db6f5923951f8fcc3a92f409dfc60ff619b4ce16857993632ad636cf885aabcb3e0eb45867a251c4f656b65d4faacb8bf6029808b0 May 16 00:28:30.857441 unknown[646]: fetched base config from "system" May 16 00:28:30.857452 unknown[646]: fetched user config from "qemu" May 16 00:28:30.857872 ignition[646]: fetch-offline: fetch-offline passed May 16 00:28:30.858974 systemd[1]: Finished ignition-fetch-offline.service. May 16 00:28:30.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.857923 ignition[646]: Ignition finished successfully May 16 00:28:30.860873 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 16 00:28:30.861707 systemd[1]: Starting ignition-kargs.service... May 16 00:28:30.876041 ignition[761]: Ignition 2.14.0 May 16 00:28:30.876053 ignition[761]: Stage: kargs May 16 00:28:30.876161 ignition[761]: no configs at "/usr/lib/ignition/base.d" May 16 00:28:30.876172 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:28:30.878013 ignition[761]: kargs: kargs passed May 16 00:28:30.879980 systemd[1]: Finished ignition-kargs.service. May 16 00:28:30.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.878066 ignition[761]: Ignition finished successfully May 16 00:28:30.882105 systemd[1]: Starting ignition-disks.service... May 16 00:28:30.893875 ignition[767]: Ignition 2.14.0 May 16 00:28:30.893887 ignition[767]: Stage: disks May 16 00:28:30.893999 ignition[767]: no configs at "/usr/lib/ignition/base.d" May 16 00:28:30.896113 systemd[1]: Finished ignition-disks.service. May 16 00:28:30.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.894009 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:28:30.897588 systemd[1]: Reached target initrd-root-device.target. May 16 00:28:30.894894 ignition[767]: disks: disks passed May 16 00:28:30.898741 systemd[1]: Reached target local-fs-pre.target. May 16 00:28:30.894939 ignition[767]: Ignition finished successfully May 16 00:28:30.900256 systemd[1]: Reached target local-fs.target. May 16 00:28:30.901486 systemd[1]: Reached target sysinit.target. May 16 00:28:30.902517 systemd[1]: Reached target basic.target. May 16 00:28:30.904753 systemd[1]: Starting systemd-fsck-root.service... May 16 00:28:30.916406 systemd-fsck[775]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 16 00:28:30.919830 systemd[1]: Finished systemd-fsck-root.service. May 16 00:28:30.919000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.921444 systemd[1]: Mounting sysroot.mount... May 16 00:28:30.926830 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 16 00:28:30.927050 systemd[1]: Mounted sysroot.mount. May 16 00:28:30.927653 systemd[1]: Reached target initrd-root-fs.target. May 16 00:28:30.930279 systemd[1]: Mounting sysroot-usr.mount... May 16 00:28:30.931055 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 16 00:28:30.931103 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 16 00:28:30.931132 systemd[1]: Reached target ignition-diskful.target. May 16 00:28:30.933293 systemd[1]: Mounted sysroot-usr.mount. May 16 00:28:30.934679 systemd[1]: Starting initrd-setup-root.service... May 16 00:28:30.938879 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory May 16 00:28:30.942488 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory May 16 00:28:30.946932 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory May 16 00:28:30.951319 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory May 16 00:28:30.982715 systemd[1]: Finished initrd-setup-root.service. May 16 00:28:30.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:30.984301 systemd[1]: Starting ignition-mount.service... May 16 00:28:30.985755 systemd[1]: Starting sysroot-boot.service... May 16 00:28:30.992968 bash[826]: umount: /sysroot/usr/share/oem: not mounted. May 16 00:28:31.001525 ignition[827]: INFO : Ignition 2.14.0 May 16 00:28:31.001525 ignition[827]: INFO : Stage: mount May 16 00:28:31.002830 ignition[827]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:28:31.002830 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:28:31.002830 ignition[827]: INFO : mount: mount passed May 16 00:28:31.002830 ignition[827]: INFO : Ignition finished successfully May 16 00:28:31.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:31.003370 systemd[1]: Finished ignition-mount.service. May 16 00:28:31.019103 systemd[1]: Finished sysroot-boot.service. May 16 00:28:31.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:31.599198 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 16 00:28:31.607509 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (836) May 16 00:28:31.609426 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 16 00:28:31.609461 kernel: BTRFS info (device vda6): using free space tree May 16 00:28:31.609471 kernel: BTRFS info (device vda6): has skinny extents May 16 00:28:31.615175 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 16 00:28:31.616595 systemd[1]: Starting ignition-files.service... May 16 00:28:31.639878 ignition[856]: INFO : Ignition 2.14.0 May 16 00:28:31.639878 ignition[856]: INFO : Stage: files May 16 00:28:31.644260 ignition[856]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:28:31.644260 ignition[856]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:28:31.646283 ignition[856]: DEBUG : files: compiled without relabeling support, skipping May 16 00:28:31.653343 ignition[856]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 16 00:28:31.653343 ignition[856]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 16 00:28:31.658309 ignition[856]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 16 00:28:31.659355 ignition[856]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 16 00:28:31.660499 unknown[856]: wrote ssh authorized keys file for user: core May 16 00:28:31.661519 ignition[856]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 16 00:28:31.661519 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 16 00:28:31.661519 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.0-linux-arm64.tar.gz: attempt #1 May 16 00:28:31.716376 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 16 00:28:31.849477 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.0-linux-arm64.tar.gz" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 16 00:28:31.851030 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 16 00:28:31.861184 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 16 00:28:31.861184 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 16 00:28:31.861184 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 16 00:28:31.861184 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 16 00:28:31.861184 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 16 00:28:31.861184 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.32.4-arm64.raw: attempt #1 May 16 00:28:32.090947 systemd-networkd[740]: eth0: Gained IPv6LL May 16 00:28:32.590640 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 16 00:28:32.990438 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.32.4-arm64.raw" May 16 00:28:32.990438 ignition[856]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 16 00:28:32.993574 ignition[856]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 16 00:28:33.043559 ignition[856]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 16 00:28:33.044868 ignition[856]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 16 00:28:33.044868 ignition[856]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 16 00:28:33.044868 ignition[856]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 16 00:28:33.044868 ignition[856]: INFO : files: files passed May 16 00:28:33.044868 ignition[856]: INFO : Ignition finished successfully May 16 00:28:33.053623 kernel: kauditd_printk_skb: 22 callbacks suppressed May 16 00:28:33.053644 kernel: audit: type=1130 audit(1747355313.046:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.045107 systemd[1]: Finished ignition-files.service. May 16 00:28:33.047919 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 16 00:28:33.052582 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 16 00:28:33.053460 systemd[1]: Starting ignition-quench.service... May 16 00:28:33.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.060093 initrd-setup-root-after-ignition[882]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 16 00:28:33.062872 kernel: audit: type=1130 audit(1747355313.057:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.062891 kernel: audit: type=1131 audit(1747355313.057:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.056485 systemd[1]: ignition-quench.service: Deactivated successfully. May 16 00:28:33.063593 initrd-setup-root-after-ignition[884]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 16 00:28:33.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.056596 systemd[1]: Finished ignition-quench.service. May 16 00:28:33.068277 kernel: audit: type=1130 audit(1747355313.064:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.063387 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 16 00:28:33.064379 systemd[1]: Reached target ignition-complete.target. May 16 00:28:33.068530 systemd[1]: Starting initrd-parse-etc.service... May 16 00:28:33.082936 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 16 00:28:33.083046 systemd[1]: Finished initrd-parse-etc.service. May 16 00:28:33.088552 kernel: audit: type=1130 audit(1747355313.083:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.088574 kernel: audit: type=1131 audit(1747355313.083:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.084661 systemd[1]: Reached target initrd-fs.target. May 16 00:28:33.089133 systemd[1]: Reached target initrd.target. May 16 00:28:33.090146 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 16 00:28:33.090972 systemd[1]: Starting dracut-pre-pivot.service... May 16 00:28:33.102358 systemd[1]: Finished dracut-pre-pivot.service. May 16 00:28:33.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.103899 systemd[1]: Starting initrd-cleanup.service... May 16 00:28:33.106479 kernel: audit: type=1130 audit(1747355313.102:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.113377 systemd[1]: Stopped target nss-lookup.target. May 16 00:28:33.114096 systemd[1]: Stopped target remote-cryptsetup.target. May 16 00:28:33.115263 systemd[1]: Stopped target timers.target. May 16 00:28:33.116294 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 16 00:28:33.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.116401 systemd[1]: Stopped dracut-pre-pivot.service. May 16 00:28:33.120651 kernel: audit: type=1131 audit(1747355313.117:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.117425 systemd[1]: Stopped target initrd.target. May 16 00:28:33.120267 systemd[1]: Stopped target basic.target. May 16 00:28:33.121308 systemd[1]: Stopped target ignition-complete.target. May 16 00:28:33.122343 systemd[1]: Stopped target ignition-diskful.target. May 16 00:28:33.123380 systemd[1]: Stopped target initrd-root-device.target. May 16 00:28:33.124584 systemd[1]: Stopped target remote-fs.target. May 16 00:28:33.125609 systemd[1]: Stopped target remote-fs-pre.target. May 16 00:28:33.126730 systemd[1]: Stopped target sysinit.target. May 16 00:28:33.127702 systemd[1]: Stopped target local-fs.target. May 16 00:28:33.128768 systemd[1]: Stopped target local-fs-pre.target. May 16 00:28:33.129849 systemd[1]: Stopped target swap.target. May 16 00:28:33.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.130761 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 16 00:28:33.135114 kernel: audit: type=1131 audit(1747355313.131:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.130884 systemd[1]: Stopped dracut-pre-mount.service. May 16 00:28:33.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.137829 kernel: audit: type=1131 audit(1747355313.135:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.131964 systemd[1]: Stopped target cryptsetup.target. May 16 00:28:33.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.134568 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 16 00:28:33.134663 systemd[1]: Stopped dracut-initqueue.service. May 16 00:28:33.135736 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 16 00:28:33.135838 systemd[1]: Stopped ignition-fetch-offline.service. May 16 00:28:33.138694 systemd[1]: Stopped target paths.target. May 16 00:28:33.139577 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 16 00:28:33.142836 systemd[1]: Stopped systemd-ask-password-console.path. May 16 00:28:33.143890 systemd[1]: Stopped target slices.target. May 16 00:28:33.144896 systemd[1]: Stopped target sockets.target. May 16 00:28:33.145820 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 16 00:28:33.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.145920 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 16 00:28:33.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.146961 systemd[1]: ignition-files.service: Deactivated successfully. May 16 00:28:33.147047 systemd[1]: Stopped ignition-files.service. May 16 00:28:33.151513 iscsid[747]: iscsid shutting down. May 16 00:28:33.148927 systemd[1]: Stopping ignition-mount.service... May 16 00:28:33.149933 systemd[1]: Stopping iscsid.service... May 16 00:28:33.154942 ignition[897]: INFO : Ignition 2.14.0 May 16 00:28:33.154942 ignition[897]: INFO : Stage: umount May 16 00:28:33.156106 ignition[897]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:28:33.156106 ignition[897]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:28:33.156106 ignition[897]: INFO : umount: umount passed May 16 00:28:33.156106 ignition[897]: INFO : Ignition finished successfully May 16 00:28:33.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.155970 systemd[1]: Stopping sysroot-boot.service... May 16 00:28:33.156745 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 16 00:28:33.156932 systemd[1]: Stopped systemd-udev-trigger.service. May 16 00:28:33.158443 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 16 00:28:33.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.162365 systemd[1]: Stopped dracut-pre-trigger.service. May 16 00:28:33.165408 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 16 00:28:33.165979 systemd[1]: iscsid.service: Deactivated successfully. May 16 00:28:33.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.166075 systemd[1]: Stopped iscsid.service. May 16 00:28:33.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.167347 systemd[1]: ignition-mount.service: Deactivated successfully. May 16 00:28:33.167421 systemd[1]: Stopped ignition-mount.service. May 16 00:28:33.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.168508 systemd[1]: iscsid.socket: Deactivated successfully. May 16 00:28:33.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.168569 systemd[1]: Closed iscsid.socket. May 16 00:28:33.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.169263 systemd[1]: ignition-disks.service: Deactivated successfully. May 16 00:28:33.169301 systemd[1]: Stopped ignition-disks.service. May 16 00:28:33.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.170566 systemd[1]: ignition-kargs.service: Deactivated successfully. May 16 00:28:33.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.170603 systemd[1]: Stopped ignition-kargs.service. May 16 00:28:33.171672 systemd[1]: ignition-setup.service: Deactivated successfully. May 16 00:28:33.171717 systemd[1]: Stopped ignition-setup.service. May 16 00:28:33.173011 systemd[1]: Stopping iscsiuio.service... May 16 00:28:33.175425 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 16 00:28:33.175503 systemd[1]: Finished initrd-cleanup.service. May 16 00:28:33.176763 systemd[1]: iscsiuio.service: Deactivated successfully. May 16 00:28:33.176866 systemd[1]: Stopped iscsiuio.service. May 16 00:28:33.178424 systemd[1]: Stopped target network.target. May 16 00:28:33.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.179443 systemd[1]: iscsiuio.socket: Deactivated successfully. May 16 00:28:33.179493 systemd[1]: Closed iscsiuio.socket. May 16 00:28:33.180761 systemd[1]: Stopping systemd-networkd.service... May 16 00:28:33.182008 systemd[1]: Stopping systemd-resolved.service... May 16 00:28:33.183833 systemd-networkd[740]: eth0: DHCPv6 lease lost May 16 00:28:33.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.184955 systemd[1]: systemd-networkd.service: Deactivated successfully. May 16 00:28:33.192000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.185037 systemd[1]: Stopped systemd-networkd.service. May 16 00:28:33.186440 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 16 00:28:33.193000 audit: BPF prog-id=9 op=UNLOAD May 16 00:28:33.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.186466 systemd[1]: Closed systemd-networkd.socket. May 16 00:28:33.187789 systemd[1]: Stopping network-cleanup.service... May 16 00:28:33.188760 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 16 00:28:33.188826 systemd[1]: Stopped parse-ip-for-networkd.service. May 16 00:28:33.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.191235 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 16 00:28:33.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.191279 systemd[1]: Stopped systemd-sysctl.service. May 16 00:28:33.192772 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 16 00:28:33.204000 audit: BPF prog-id=6 op=UNLOAD May 16 00:28:33.192816 systemd[1]: Stopped systemd-modules-load.service. May 16 00:28:33.194112 systemd[1]: Stopping systemd-udevd.service... May 16 00:28:33.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.198649 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 16 00:28:33.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.199149 systemd[1]: systemd-resolved.service: Deactivated successfully. May 16 00:28:33.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.199240 systemd[1]: Stopped systemd-resolved.service. May 16 00:28:33.201966 systemd[1]: systemd-udevd.service: Deactivated successfully. May 16 00:28:33.202068 systemd[1]: Stopped systemd-udevd.service. May 16 00:28:33.203668 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 16 00:28:33.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.203706 systemd[1]: Closed systemd-udevd-control.socket. May 16 00:28:33.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.205011 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 16 00:28:33.205040 systemd[1]: Closed systemd-udevd-kernel.socket. May 16 00:28:33.206391 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 16 00:28:33.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.206430 systemd[1]: Stopped dracut-pre-udev.service. May 16 00:28:33.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.207593 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 16 00:28:33.207630 systemd[1]: Stopped dracut-cmdline.service. May 16 00:28:33.208723 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 16 00:28:33.208761 systemd[1]: Stopped dracut-cmdline-ask.service. May 16 00:28:33.210867 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 16 00:28:33.211643 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 16 00:28:33.211705 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 16 00:28:33.213557 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 16 00:28:33.213607 systemd[1]: Stopped kmod-static-nodes.service. May 16 00:28:33.214840 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 16 00:28:33.214878 systemd[1]: Stopped systemd-vconsole-setup.service. May 16 00:28:33.217129 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 16 00:28:33.217602 systemd[1]: network-cleanup.service: Deactivated successfully. May 16 00:28:33.217690 systemd[1]: Stopped network-cleanup.service. May 16 00:28:33.219190 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 16 00:28:33.219267 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 16 00:28:33.272153 systemd[1]: sysroot-boot.service: Deactivated successfully. May 16 00:28:33.272247 systemd[1]: Stopped sysroot-boot.service. May 16 00:28:33.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.273707 systemd[1]: Reached target initrd-switch-root.target. May 16 00:28:33.275660 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 16 00:28:33.275727 systemd[1]: Stopped initrd-setup-root.service. May 16 00:28:33.277742 systemd[1]: Starting initrd-switch-root.service... May 16 00:28:33.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:33.285577 systemd[1]: Switching root. May 16 00:28:33.310049 systemd-journald[290]: Journal stopped May 16 00:28:35.417124 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 16 00:28:35.417185 kernel: SELinux: Class mctp_socket not defined in policy. May 16 00:28:35.417198 kernel: SELinux: Class anon_inode not defined in policy. May 16 00:28:35.417213 kernel: SELinux: the above unknown classes and permissions will be allowed May 16 00:28:35.417223 kernel: SELinux: policy capability network_peer_controls=1 May 16 00:28:35.417233 kernel: SELinux: policy capability open_perms=1 May 16 00:28:35.417244 kernel: SELinux: policy capability extended_socket_class=1 May 16 00:28:35.417256 kernel: SELinux: policy capability always_check_network=0 May 16 00:28:35.417265 kernel: SELinux: policy capability cgroup_seclabel=1 May 16 00:28:35.417274 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 16 00:28:35.417284 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 16 00:28:35.417293 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 16 00:28:35.417305 systemd[1]: Successfully loaded SELinux policy in 32.946ms. May 16 00:28:35.417324 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 8.618ms. May 16 00:28:35.417336 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 16 00:28:35.417347 systemd[1]: Detected virtualization kvm. May 16 00:28:35.417358 systemd[1]: Detected architecture arm64. May 16 00:28:35.417368 systemd[1]: Detected first boot. May 16 00:28:35.417379 systemd[1]: Initializing machine ID from VM UUID. May 16 00:28:35.417391 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 16 00:28:35.417401 systemd[1]: Populated /etc with preset unit settings. May 16 00:28:35.417415 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:28:35.417431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:28:35.417443 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:28:35.417454 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 16 00:28:35.417464 systemd[1]: Stopped initrd-switch-root.service. May 16 00:28:35.417475 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 16 00:28:35.417485 systemd[1]: Created slice system-addon\x2dconfig.slice. May 16 00:28:35.417496 systemd[1]: Created slice system-addon\x2drun.slice. May 16 00:28:35.417507 systemd[1]: Created slice system-getty.slice. May 16 00:28:35.417517 systemd[1]: Created slice system-modprobe.slice. May 16 00:28:35.417528 systemd[1]: Created slice system-serial\x2dgetty.slice. May 16 00:28:35.417538 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 16 00:28:35.417548 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 16 00:28:35.417558 systemd[1]: Created slice user.slice. May 16 00:28:35.417568 systemd[1]: Started systemd-ask-password-console.path. May 16 00:28:35.417579 systemd[1]: Started systemd-ask-password-wall.path. May 16 00:28:35.417590 systemd[1]: Set up automount boot.automount. May 16 00:28:35.417601 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 16 00:28:35.417611 systemd[1]: Stopped target initrd-switch-root.target. May 16 00:28:35.417622 systemd[1]: Stopped target initrd-fs.target. May 16 00:28:35.417633 systemd[1]: Stopped target initrd-root-fs.target. May 16 00:28:35.417644 systemd[1]: Reached target integritysetup.target. May 16 00:28:35.417654 systemd[1]: Reached target remote-cryptsetup.target. May 16 00:28:35.417664 systemd[1]: Reached target remote-fs.target. May 16 00:28:35.417676 systemd[1]: Reached target slices.target. May 16 00:28:35.417687 systemd[1]: Reached target swap.target. May 16 00:28:35.417697 systemd[1]: Reached target torcx.target. May 16 00:28:35.417707 systemd[1]: Reached target veritysetup.target. May 16 00:28:35.417718 systemd[1]: Listening on systemd-coredump.socket. May 16 00:28:35.417729 systemd[1]: Listening on systemd-initctl.socket. May 16 00:28:35.417739 systemd[1]: Listening on systemd-networkd.socket. May 16 00:28:35.417749 systemd[1]: Listening on systemd-udevd-control.socket. May 16 00:28:35.417759 systemd[1]: Listening on systemd-udevd-kernel.socket. May 16 00:28:35.417770 systemd[1]: Listening on systemd-userdbd.socket. May 16 00:28:35.417781 systemd[1]: Mounting dev-hugepages.mount... May 16 00:28:35.417791 systemd[1]: Mounting dev-mqueue.mount... May 16 00:28:35.417801 systemd[1]: Mounting media.mount... May 16 00:28:35.417817 systemd[1]: Mounting sys-kernel-debug.mount... May 16 00:28:35.417831 systemd[1]: Mounting sys-kernel-tracing.mount... May 16 00:28:35.417841 systemd[1]: Mounting tmp.mount... May 16 00:28:35.417851 systemd[1]: Starting flatcar-tmpfiles.service... May 16 00:28:35.417862 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:28:35.417872 systemd[1]: Starting kmod-static-nodes.service... May 16 00:28:35.417884 systemd[1]: Starting modprobe@configfs.service... May 16 00:28:35.417894 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:28:35.417904 systemd[1]: Starting modprobe@drm.service... May 16 00:28:35.417914 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:28:35.417925 systemd[1]: Starting modprobe@fuse.service... May 16 00:28:35.417935 systemd[1]: Starting modprobe@loop.service... May 16 00:28:35.417945 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 16 00:28:35.417956 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 16 00:28:35.417966 systemd[1]: Stopped systemd-fsck-root.service. May 16 00:28:35.417977 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 16 00:28:35.417987 systemd[1]: Stopped systemd-fsck-usr.service. May 16 00:28:35.417997 systemd[1]: Stopped systemd-journald.service. May 16 00:28:35.418007 kernel: fuse: init (API version 7.34) May 16 00:28:35.418017 systemd[1]: Starting systemd-journald.service... May 16 00:28:35.418027 kernel: loop: module loaded May 16 00:28:35.418036 systemd[1]: Starting systemd-modules-load.service... May 16 00:28:35.418046 systemd[1]: Starting systemd-network-generator.service... May 16 00:28:35.418057 systemd[1]: Starting systemd-remount-fs.service... May 16 00:28:35.418070 systemd[1]: Starting systemd-udev-trigger.service... May 16 00:28:35.418081 systemd[1]: verity-setup.service: Deactivated successfully. May 16 00:28:35.418090 systemd[1]: Stopped verity-setup.service. May 16 00:28:35.418100 systemd[1]: Mounted dev-hugepages.mount. May 16 00:28:35.418110 systemd[1]: Mounted dev-mqueue.mount. May 16 00:28:35.418120 systemd[1]: Mounted media.mount. May 16 00:28:35.418132 systemd-journald[995]: Journal started May 16 00:28:35.418178 systemd-journald[995]: Runtime Journal (/run/log/journal/3af638d7b0a24855869b6653c478ec26) is 6.0M, max 48.7M, 42.6M free. May 16 00:28:33.370000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 16 00:28:33.558000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 16 00:28:33.558000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 16 00:28:33.558000 audit: BPF prog-id=10 op=LOAD May 16 00:28:33.558000 audit: BPF prog-id=10 op=UNLOAD May 16 00:28:33.558000 audit: BPF prog-id=11 op=LOAD May 16 00:28:33.558000 audit: BPF prog-id=11 op=UNLOAD May 16 00:28:33.600000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 16 00:28:33.600000 audit[930]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001cd89c a1=4000150de0 a2=40001570c0 a3=32 items=0 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:33.600000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 16 00:28:33.601000 audit[930]: AVC avc: denied { associate } for pid=930 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 16 00:28:33.601000 audit[930]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001cd975 a2=1ed a3=0 items=2 ppid=913 pid=930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:33.601000 audit: CWD cwd="/" May 16 00:28:33.601000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:28:33.601000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:28:33.601000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 16 00:28:35.317000 audit: BPF prog-id=12 op=LOAD May 16 00:28:35.317000 audit: BPF prog-id=3 op=UNLOAD May 16 00:28:35.317000 audit: BPF prog-id=13 op=LOAD May 16 00:28:35.317000 audit: BPF prog-id=14 op=LOAD May 16 00:28:35.317000 audit: BPF prog-id=4 op=UNLOAD May 16 00:28:35.317000 audit: BPF prog-id=5 op=UNLOAD May 16 00:28:35.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.325000 audit: BPF prog-id=12 op=UNLOAD May 16 00:28:35.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.398000 audit: BPF prog-id=15 op=LOAD May 16 00:28:35.398000 audit: BPF prog-id=16 op=LOAD May 16 00:28:35.398000 audit: BPF prog-id=17 op=LOAD May 16 00:28:35.398000 audit: BPF prog-id=13 op=UNLOAD May 16 00:28:35.398000 audit: BPF prog-id=14 op=UNLOAD May 16 00:28:35.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.416000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 16 00:28:35.416000 audit[995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffd8bb5250 a2=4000 a3=1 items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:35.416000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 16 00:28:35.316867 systemd[1]: Queued start job for default target multi-user.target. May 16 00:28:33.599122 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:28:35.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.316880 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 16 00:28:33.599469 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 16 00:28:35.420089 systemd[1]: Started systemd-journald.service. May 16 00:28:35.319458 systemd[1]: systemd-journald.service: Deactivated successfully. May 16 00:28:33.599491 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 16 00:28:35.419885 systemd[1]: Mounted sys-kernel-debug.mount. May 16 00:28:33.599537 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 16 00:28:33.599553 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="skipped missing lower profile" missing profile=oem May 16 00:28:33.599584 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 16 00:28:33.599595 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 16 00:28:33.599800 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 16 00:28:33.599854 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 16 00:28:33.599866 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 16 00:28:33.600561 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 16 00:28:33.600598 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 16 00:28:35.420925 systemd[1]: Mounted sys-kernel-tracing.mount. May 16 00:28:33.600617 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 16 00:28:33.600635 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 16 00:28:33.600652 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 16 00:28:33.600665 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 16 00:28:35.046393 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:28:35.046645 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:28:35.046752 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:28:35.046934 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:28:35.046985 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 16 00:28:35.047041 /usr/lib/systemd/system-generators/torcx-generator[930]: time="2025-05-16T00:28:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 16 00:28:35.421855 systemd[1]: Mounted tmp.mount. May 16 00:28:35.422572 systemd[1]: Finished kmod-static-nodes.service. May 16 00:28:35.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.423454 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 16 00:28:35.423877 systemd[1]: Finished modprobe@configfs.service. May 16 00:28:35.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.424741 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:28:35.424921 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:28:35.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.425764 systemd[1]: modprobe@drm.service: Deactivated successfully. May 16 00:28:35.425982 systemd[1]: Finished modprobe@drm.service. May 16 00:28:35.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.425000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.426832 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:28:35.427000 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:28:35.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.427887 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 16 00:28:35.428005 systemd[1]: Finished modprobe@fuse.service. May 16 00:28:35.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.429061 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:28:35.429245 systemd[1]: Finished modprobe@loop.service. May 16 00:28:35.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.429000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.430128 systemd[1]: Finished systemd-modules-load.service. May 16 00:28:35.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.431182 systemd[1]: Finished systemd-network-generator.service. May 16 00:28:35.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.432139 systemd[1]: Finished systemd-remount-fs.service. May 16 00:28:35.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.433217 systemd[1]: Reached target network-pre.target. May 16 00:28:35.435059 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 16 00:28:35.436686 systemd[1]: Mounting sys-kernel-config.mount... May 16 00:28:35.437468 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 16 00:28:35.440097 systemd[1]: Starting systemd-hwdb-update.service... May 16 00:28:35.441838 systemd[1]: Starting systemd-journal-flush.service... May 16 00:28:35.442544 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:28:35.443682 systemd[1]: Starting systemd-random-seed.service... May 16 00:28:35.444435 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:28:35.445516 systemd[1]: Starting systemd-sysctl.service... May 16 00:28:35.448123 systemd[1]: Finished flatcar-tmpfiles.service. May 16 00:28:35.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.450175 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 16 00:28:35.450680 systemd-journald[995]: Time spent on flushing to /var/log/journal/3af638d7b0a24855869b6653c478ec26 is 15.030ms for 992 entries. May 16 00:28:35.450680 systemd-journald[995]: System Journal (/var/log/journal/3af638d7b0a24855869b6653c478ec26) is 8.0M, max 195.6M, 187.6M free. May 16 00:28:35.482936 systemd-journald[995]: Received client request to flush runtime journal. May 16 00:28:35.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.451914 systemd[1]: Mounted sys-kernel-config.mount. May 16 00:28:35.453706 systemd[1]: Starting systemd-sysusers.service... May 16 00:28:35.483743 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 16 00:28:35.456456 systemd[1]: Finished systemd-random-seed.service. May 16 00:28:35.457405 systemd[1]: Reached target first-boot-complete.target. May 16 00:28:35.464103 systemd[1]: Finished systemd-udev-trigger.service. May 16 00:28:35.466050 systemd[1]: Starting systemd-udev-settle.service... May 16 00:28:35.471092 systemd[1]: Finished systemd-sysctl.service. May 16 00:28:35.478929 systemd[1]: Finished systemd-sysusers.service. May 16 00:28:35.480730 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 16 00:28:35.484141 systemd[1]: Finished systemd-journal-flush.service. May 16 00:28:35.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.498060 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 16 00:28:35.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.826541 systemd[1]: Finished systemd-hwdb-update.service. May 16 00:28:35.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.827000 audit: BPF prog-id=18 op=LOAD May 16 00:28:35.827000 audit: BPF prog-id=19 op=LOAD May 16 00:28:35.827000 audit: BPF prog-id=7 op=UNLOAD May 16 00:28:35.827000 audit: BPF prog-id=8 op=UNLOAD May 16 00:28:35.828585 systemd[1]: Starting systemd-udevd.service... May 16 00:28:35.849880 systemd-udevd[1034]: Using default interface naming scheme 'v252'. May 16 00:28:35.861856 systemd[1]: Started systemd-udevd.service. May 16 00:28:35.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.862000 audit: BPF prog-id=20 op=LOAD May 16 00:28:35.865037 systemd[1]: Starting systemd-networkd.service... May 16 00:28:35.884000 audit: BPF prog-id=21 op=LOAD May 16 00:28:35.884000 audit: BPF prog-id=22 op=LOAD May 16 00:28:35.884000 audit: BPF prog-id=23 op=LOAD May 16 00:28:35.886265 systemd[1]: Starting systemd-userdbd.service... May 16 00:28:35.903352 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 16 00:28:35.917149 systemd[1]: Started systemd-userdbd.service. May 16 00:28:35.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.934853 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 16 00:28:35.956467 systemd-networkd[1043]: lo: Link UP May 16 00:28:35.956479 systemd-networkd[1043]: lo: Gained carrier May 16 00:28:35.956799 systemd-networkd[1043]: Enumeration completed May 16 00:28:35.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.956911 systemd-networkd[1043]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 16 00:28:35.956951 systemd[1]: Started systemd-networkd.service. May 16 00:28:35.957974 systemd-networkd[1043]: eth0: Link UP May 16 00:28:35.957978 systemd-networkd[1043]: eth0: Gained carrier May 16 00:28:35.966000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:35.966241 systemd[1]: Finished systemd-udev-settle.service. May 16 00:28:35.968333 systemd[1]: Starting lvm2-activation-early.service... May 16 00:28:35.977959 systemd-networkd[1043]: eth0: DHCPv4 address 10.0.0.9/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 16 00:28:35.978589 lvm[1067]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 16 00:28:36.012708 systemd[1]: Finished lvm2-activation-early.service. May 16 00:28:36.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.013802 systemd[1]: Reached target cryptsetup.target. May 16 00:28:36.015842 systemd[1]: Starting lvm2-activation.service... May 16 00:28:36.019189 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 16 00:28:36.051678 systemd[1]: Finished lvm2-activation.service. May 16 00:28:36.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.052676 systemd[1]: Reached target local-fs-pre.target. May 16 00:28:36.053568 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 16 00:28:36.053599 systemd[1]: Reached target local-fs.target. May 16 00:28:36.054401 systemd[1]: Reached target machines.target. May 16 00:28:36.056402 systemd[1]: Starting ldconfig.service... May 16 00:28:36.057423 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:28:36.057473 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:28:36.058485 systemd[1]: Starting systemd-boot-update.service... May 16 00:28:36.060409 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 16 00:28:36.062323 systemd[1]: Starting systemd-machine-id-commit.service... May 16 00:28:36.064101 systemd[1]: Starting systemd-sysext.service... May 16 00:28:36.065501 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1070 (bootctl) May 16 00:28:36.067137 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 16 00:28:36.076511 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 16 00:28:36.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.079252 systemd[1]: Unmounting usr-share-oem.mount... May 16 00:28:36.088198 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 16 00:28:36.088415 systemd[1]: Unmounted usr-share-oem.mount. May 16 00:28:36.146087 systemd[1]: Finished systemd-machine-id-commit.service. May 16 00:28:36.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.148830 kernel: loop0: detected capacity change from 0 to 207008 May 16 00:28:36.160836 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 16 00:28:36.162877 systemd-fsck[1079]: fsck.fat 4.2 (2021-01-31) May 16 00:28:36.162877 systemd-fsck[1079]: /dev/vda1: 236 files, 117310/258078 clusters May 16 00:28:36.165780 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 16 00:28:36.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.197845 kernel: loop1: detected capacity change from 0 to 207008 May 16 00:28:36.201775 (sd-sysext)[1085]: Using extensions 'kubernetes'. May 16 00:28:36.202098 (sd-sysext)[1085]: Merged extensions into '/usr'. May 16 00:28:36.217288 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:28:36.218641 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:28:36.220695 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:28:36.222695 systemd[1]: Starting modprobe@loop.service... May 16 00:28:36.223547 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:28:36.223677 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:28:36.224559 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:28:36.224753 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:28:36.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.225916 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:28:36.226041 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:28:36.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.227217 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:28:36.227378 systemd[1]: Finished modprobe@loop.service. May 16 00:28:36.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.228657 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:28:36.228759 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:28:36.257203 ldconfig[1069]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 16 00:28:36.260703 systemd[1]: Finished ldconfig.service. May 16 00:28:36.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.414337 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 16 00:28:36.416213 systemd[1]: Mounting boot.mount... May 16 00:28:36.418076 systemd[1]: Mounting usr-share-oem.mount... May 16 00:28:36.422496 systemd[1]: Mounted usr-share-oem.mount. May 16 00:28:36.424644 systemd[1]: Finished systemd-sysext.service. May 16 00:28:36.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.425518 systemd[1]: Mounted boot.mount. May 16 00:28:36.427886 systemd[1]: Starting ensure-sysext.service... May 16 00:28:36.429566 systemd[1]: Starting systemd-tmpfiles-setup.service... May 16 00:28:36.434102 systemd[1]: Finished systemd-boot-update.service. May 16 00:28:36.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.435008 systemd[1]: Reloading. May 16 00:28:36.438637 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 16 00:28:36.439456 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 16 00:28:36.440829 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 16 00:28:36.468832 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-05-16T00:28:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:28:36.468861 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2025-05-16T00:28:36Z" level=info msg="torcx already run" May 16 00:28:36.525416 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:28:36.525435 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:28:36.540734 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:28:36.581000 audit: BPF prog-id=24 op=LOAD May 16 00:28:36.581000 audit: BPF prog-id=15 op=UNLOAD May 16 00:28:36.581000 audit: BPF prog-id=25 op=LOAD May 16 00:28:36.582000 audit: BPF prog-id=26 op=LOAD May 16 00:28:36.582000 audit: BPF prog-id=16 op=UNLOAD May 16 00:28:36.582000 audit: BPF prog-id=17 op=UNLOAD May 16 00:28:36.582000 audit: BPF prog-id=27 op=LOAD May 16 00:28:36.582000 audit: BPF prog-id=20 op=UNLOAD May 16 00:28:36.583000 audit: BPF prog-id=28 op=LOAD May 16 00:28:36.583000 audit: BPF prog-id=29 op=LOAD May 16 00:28:36.583000 audit: BPF prog-id=18 op=UNLOAD May 16 00:28:36.583000 audit: BPF prog-id=19 op=UNLOAD May 16 00:28:36.584000 audit: BPF prog-id=30 op=LOAD May 16 00:28:36.584000 audit: BPF prog-id=21 op=UNLOAD May 16 00:28:36.584000 audit: BPF prog-id=31 op=LOAD May 16 00:28:36.584000 audit: BPF prog-id=32 op=LOAD May 16 00:28:36.584000 audit: BPF prog-id=22 op=UNLOAD May 16 00:28:36.584000 audit: BPF prog-id=23 op=UNLOAD May 16 00:28:36.587181 systemd[1]: Finished systemd-tmpfiles-setup.service. May 16 00:28:36.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.591510 systemd[1]: Starting audit-rules.service... May 16 00:28:36.593509 systemd[1]: Starting clean-ca-certificates.service... May 16 00:28:36.595480 systemd[1]: Starting systemd-journal-catalog-update.service... May 16 00:28:36.599000 audit: BPF prog-id=33 op=LOAD May 16 00:28:36.601044 systemd[1]: Starting systemd-resolved.service... May 16 00:28:36.602000 audit: BPF prog-id=34 op=LOAD May 16 00:28:36.603852 systemd[1]: Starting systemd-timesyncd.service... May 16 00:28:36.605717 systemd[1]: Starting systemd-update-utmp.service... May 16 00:28:36.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.608730 systemd[1]: Finished clean-ca-certificates.service. May 16 00:28:36.610005 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:28:36.612000 audit[1163]: SYSTEM_BOOT pid=1163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 16 00:28:36.615338 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:28:36.616579 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:28:36.619450 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:28:36.621413 systemd[1]: Starting modprobe@loop.service... May 16 00:28:36.622202 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:28:36.622365 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:28:36.622496 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:28:36.623731 systemd[1]: Finished systemd-journal-catalog-update.service. May 16 00:28:36.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.625246 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:28:36.625364 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:28:36.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.626428 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:28:36.626538 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:28:36.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.627686 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:28:36.627954 systemd[1]: Finished modprobe@loop.service. May 16 00:28:36.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.628965 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:28:36.629104 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:28:36.630368 systemd[1]: Starting systemd-update-done.service... May 16 00:28:36.632713 systemd[1]: Finished systemd-update-utmp.service. May 16 00:28:36.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.635007 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:28:36.636060 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:28:36.638003 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:28:36.639564 systemd[1]: Starting modprobe@loop.service... May 16 00:28:36.640656 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:28:36.640778 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:28:36.640878 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:28:36.641640 systemd[1]: Finished systemd-update-done.service. May 16 00:28:36.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.642669 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:28:36.642774 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:28:36.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.643765 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:28:36.643877 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:28:36.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.644823 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:28:36.644927 systemd[1]: Finished modprobe@loop.service. May 16 00:28:36.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.647654 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:28:36.648791 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:28:36.650597 systemd[1]: Starting modprobe@drm.service... May 16 00:28:36.652438 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:28:36.654315 systemd[1]: Starting modprobe@loop.service... May 16 00:28:36.655017 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:28:36.655134 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:28:36.656303 systemd[1]: Starting systemd-networkd-wait-online.service... May 16 00:28:36.657363 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:28:36.658418 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:28:36.658546 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:28:36.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.659632 systemd[1]: modprobe@drm.service: Deactivated successfully. May 16 00:28:36.659744 systemd[1]: Finished modprobe@drm.service. May 16 00:28:36.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.661020 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:28:36.661140 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:28:36.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.662147 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:28:36.662266 systemd[1]: Finished modprobe@loop.service. May 16 00:28:36.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.663380 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:28:36.663491 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:28:36.664712 systemd[1]: Finished ensure-sysext.service. May 16 00:28:36.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:36.673548 systemd-resolved[1156]: Positive Trust Anchors: May 16 00:28:36.673558 systemd-resolved[1156]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 16 00:28:36.673607 systemd-resolved[1156]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 16 00:28:37.153748 systemd-timesyncd[1162]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 16 00:28:37.153800 systemd-timesyncd[1162]: Initial clock synchronization to Fri 2025-05-16 00:28:37.153674 UTC. May 16 00:28:37.154291 systemd[1]: Started systemd-timesyncd.service. May 16 00:28:37.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:37.155253 systemd[1]: Reached target time-set.target. May 16 00:28:37.157000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 16 00:28:37.157000 audit[1186]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffa1ce6b0 a2=420 a3=0 items=0 ppid=1152 pid=1186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:37.157000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 16 00:28:37.159146 augenrules[1186]: No rules May 16 00:28:37.160109 systemd[1]: Finished audit-rules.service. May 16 00:28:37.163992 systemd-resolved[1156]: Defaulting to hostname 'linux'. May 16 00:28:37.165428 systemd[1]: Started systemd-resolved.service. May 16 00:28:37.166069 systemd[1]: Reached target network.target. May 16 00:28:37.166664 systemd[1]: Reached target nss-lookup.target. May 16 00:28:37.167238 systemd[1]: Reached target sysinit.target. May 16 00:28:37.167849 systemd[1]: Started motdgen.path. May 16 00:28:37.168371 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 16 00:28:37.169287 systemd[1]: Started logrotate.timer. May 16 00:28:37.169891 systemd[1]: Started mdadm.timer. May 16 00:28:37.170681 systemd[1]: Started systemd-tmpfiles-clean.timer. May 16 00:28:37.171290 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 16 00:28:37.171322 systemd[1]: Reached target paths.target. May 16 00:28:37.171858 systemd[1]: Reached target timers.target. May 16 00:28:37.172709 systemd[1]: Listening on dbus.socket. May 16 00:28:37.174259 systemd[1]: Starting docker.socket... May 16 00:28:37.177227 systemd[1]: Listening on sshd.socket. May 16 00:28:37.177904 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:28:37.178386 systemd[1]: Listening on docker.socket. May 16 00:28:37.179031 systemd[1]: Reached target sockets.target. May 16 00:28:37.179691 systemd[1]: Reached target basic.target. May 16 00:28:37.180330 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 16 00:28:37.180359 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 16 00:28:37.181322 systemd[1]: Starting containerd.service... May 16 00:28:37.182850 systemd[1]: Starting dbus.service... May 16 00:28:37.184394 systemd[1]: Starting enable-oem-cloudinit.service... May 16 00:28:37.186116 systemd[1]: Starting extend-filesystems.service... May 16 00:28:37.186819 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 16 00:28:37.188163 systemd[1]: Starting motdgen.service... May 16 00:28:37.190036 systemd[1]: Starting prepare-helm.service... May 16 00:28:37.192673 jq[1195]: false May 16 00:28:37.192901 systemd[1]: Starting ssh-key-proc-cmdline.service... May 16 00:28:37.194575 systemd[1]: Starting sshd-keygen.service... May 16 00:28:37.197242 systemd[1]: Starting systemd-logind.service... May 16 00:28:37.197885 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:28:37.197964 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 16 00:28:37.198375 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 16 00:28:37.199039 systemd[1]: Starting update-engine.service... May 16 00:28:37.201320 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 16 00:28:37.203646 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 16 00:28:37.203818 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 16 00:28:37.204845 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 16 00:28:37.207007 jq[1209]: true May 16 00:28:37.205006 systemd[1]: Finished ssh-key-proc-cmdline.service. May 16 00:28:37.213054 systemd[1]: Started dbus.service. May 16 00:28:37.212891 dbus-daemon[1194]: [system] SELinux support is enabled May 16 00:28:37.215616 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 16 00:28:37.215648 systemd[1]: Reached target system-config.target. May 16 00:28:37.216643 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 16 00:28:37.216667 systemd[1]: Reached target user-config.target. May 16 00:28:37.216779 jq[1214]: true May 16 00:28:37.234505 tar[1212]: linux-arm64/LICENSE May 16 00:28:37.234722 tar[1212]: linux-arm64/helm May 16 00:28:37.235893 systemd[1]: motdgen.service: Deactivated successfully. May 16 00:28:37.236545 extend-filesystems[1196]: Found loop1 May 16 00:28:37.236545 extend-filesystems[1196]: Found vda May 16 00:28:37.236545 extend-filesystems[1196]: Found vda1 May 16 00:28:37.236545 extend-filesystems[1196]: Found vda2 May 16 00:28:37.236545 extend-filesystems[1196]: Found vda3 May 16 00:28:37.236545 extend-filesystems[1196]: Found usr May 16 00:28:37.236545 extend-filesystems[1196]: Found vda4 May 16 00:28:37.236545 extend-filesystems[1196]: Found vda6 May 16 00:28:37.236545 extend-filesystems[1196]: Found vda7 May 16 00:28:37.236545 extend-filesystems[1196]: Found vda9 May 16 00:28:37.236545 extend-filesystems[1196]: Checking size of /dev/vda9 May 16 00:28:37.236054 systemd[1]: Finished motdgen.service. May 16 00:28:37.265986 extend-filesystems[1196]: Resized partition /dev/vda9 May 16 00:28:37.269700 extend-filesystems[1244]: resize2fs 1.46.5 (30-Dec-2021) May 16 00:28:37.288239 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 16 00:28:37.298351 update_engine[1207]: I0516 00:28:37.298066 1207 main.cc:92] Flatcar Update Engine starting May 16 00:28:37.313099 update_engine[1207]: I0516 00:28:37.302837 1207 update_check_scheduler.cc:74] Next update check in 5m30s May 16 00:28:37.302818 systemd[1]: Started update-engine.service. May 16 00:28:37.305012 systemd[1]: Started locksmithd.service. May 16 00:28:37.312950 systemd-logind[1202]: Watching system buttons on /dev/input/event0 (Power Button) May 16 00:28:37.313858 systemd-logind[1202]: New seat seat0. May 16 00:28:37.316273 systemd[1]: Started systemd-logind.service. May 16 00:28:37.323183 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 16 00:28:37.339448 bash[1242]: Updated "/home/core/.ssh/authorized_keys" May 16 00:28:37.325895 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 16 00:28:37.341866 extend-filesystems[1244]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 16 00:28:37.341866 extend-filesystems[1244]: old_desc_blocks = 1, new_desc_blocks = 1 May 16 00:28:37.341866 extend-filesystems[1244]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 16 00:28:37.346869 extend-filesystems[1196]: Resized filesystem in /dev/vda9 May 16 00:28:37.343973 systemd[1]: extend-filesystems.service: Deactivated successfully. May 16 00:28:37.347876 env[1215]: time="2025-05-16T00:28:37.342115540Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 16 00:28:37.344157 systemd[1]: Finished extend-filesystems.service. May 16 00:28:37.358783 locksmithd[1246]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 16 00:28:37.368020 env[1215]: time="2025-05-16T00:28:37.367976740Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 16 00:28:37.368355 env[1215]: time="2025-05-16T00:28:37.368246260Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 16 00:28:37.369703 env[1215]: time="2025-05-16T00:28:37.369651900Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 16 00:28:37.369703 env[1215]: time="2025-05-16T00:28:37.369685540Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 16 00:28:37.369927 env[1215]: time="2025-05-16T00:28:37.369904500Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 16 00:28:37.369927 env[1215]: time="2025-05-16T00:28:37.369924860Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 16 00:28:37.369984 env[1215]: time="2025-05-16T00:28:37.369938260Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 16 00:28:37.369984 env[1215]: time="2025-05-16T00:28:37.369948620Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 16 00:28:37.370034 env[1215]: time="2025-05-16T00:28:37.370021740Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 16 00:28:37.370286 env[1215]: time="2025-05-16T00:28:37.370268180Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 16 00:28:37.370410 env[1215]: time="2025-05-16T00:28:37.370392220Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 16 00:28:37.370445 env[1215]: time="2025-05-16T00:28:37.370410420Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 16 00:28:37.370479 env[1215]: time="2025-05-16T00:28:37.370464660Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 16 00:28:37.370510 env[1215]: time="2025-05-16T00:28:37.370479900Z" level=info msg="metadata content store policy set" policy=shared May 16 00:28:37.379530 env[1215]: time="2025-05-16T00:28:37.379494220Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 16 00:28:37.379607 env[1215]: time="2025-05-16T00:28:37.379535340Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 16 00:28:37.379607 env[1215]: time="2025-05-16T00:28:37.379551660Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 16 00:28:37.379607 env[1215]: time="2025-05-16T00:28:37.379583740Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 16 00:28:37.379607 env[1215]: time="2025-05-16T00:28:37.379597940Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 16 00:28:37.379705 env[1215]: time="2025-05-16T00:28:37.379611940Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 16 00:28:37.379705 env[1215]: time="2025-05-16T00:28:37.379629740Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 16 00:28:37.379983 env[1215]: time="2025-05-16T00:28:37.379968380Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 16 00:28:37.380018 env[1215]: time="2025-05-16T00:28:37.379989540Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 16 00:28:37.380018 env[1215]: time="2025-05-16T00:28:37.380005140Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 16 00:28:37.380063 env[1215]: time="2025-05-16T00:28:37.380017980Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 16 00:28:37.380063 env[1215]: time="2025-05-16T00:28:37.380030540Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 16 00:28:37.380162 env[1215]: time="2025-05-16T00:28:37.380145380Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 16 00:28:37.380280 env[1215]: time="2025-05-16T00:28:37.380263140Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 16 00:28:37.380541 env[1215]: time="2025-05-16T00:28:37.380513940Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 16 00:28:37.380573 env[1215]: time="2025-05-16T00:28:37.380551580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380573 env[1215]: time="2025-05-16T00:28:37.380566620Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 16 00:28:37.380682 env[1215]: time="2025-05-16T00:28:37.380669940Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380710 env[1215]: time="2025-05-16T00:28:37.380685780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380710 env[1215]: time="2025-05-16T00:28:37.380699340Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380757 env[1215]: time="2025-05-16T00:28:37.380710780Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380757 env[1215]: time="2025-05-16T00:28:37.380722260Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380757 env[1215]: time="2025-05-16T00:28:37.380733660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380757 env[1215]: time="2025-05-16T00:28:37.380744540Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380757 env[1215]: time="2025-05-16T00:28:37.380755620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380857 env[1215]: time="2025-05-16T00:28:37.380768620Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 16 00:28:37.380906 env[1215]: time="2025-05-16T00:28:37.380886460Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380936 env[1215]: time="2025-05-16T00:28:37.380906300Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380936 env[1215]: time="2025-05-16T00:28:37.380919500Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 16 00:28:37.380936 env[1215]: time="2025-05-16T00:28:37.380930580Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 16 00:28:37.380993 env[1215]: time="2025-05-16T00:28:37.380943660Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 16 00:28:37.380993 env[1215]: time="2025-05-16T00:28:37.380954300Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 16 00:28:37.380993 env[1215]: time="2025-05-16T00:28:37.380971300Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 16 00:28:37.381058 env[1215]: time="2025-05-16T00:28:37.381003980Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 16 00:28:37.381261 env[1215]: time="2025-05-16T00:28:37.381208180Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.381268260Z" level=info msg="Connect containerd service" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.381299220Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.381937780Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382308100Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382347180Z" level=info msg=serving... address=/run/containerd/containerd.sock May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382572900Z" level=info msg="Start subscribing containerd event" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382632020Z" level=info msg="Start recovering state" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382707860Z" level=info msg="Start event monitor" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382740100Z" level=info msg="Start snapshots syncer" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382751020Z" level=info msg="Start cni network conf syncer for default" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.382758460Z" level=info msg="Start streaming server" May 16 00:28:37.383892 env[1215]: time="2025-05-16T00:28:37.383541060Z" level=info msg="containerd successfully booted in 0.052124s" May 16 00:28:37.382471 systemd[1]: Started containerd.service. May 16 00:28:37.700692 tar[1212]: linux-arm64/README.md May 16 00:28:37.705229 systemd[1]: Finished prepare-helm.service. May 16 00:28:38.074373 systemd-networkd[1043]: eth0: Gained IPv6LL May 16 00:28:38.076541 systemd[1]: Finished systemd-networkd-wait-online.service. May 16 00:28:38.077579 systemd[1]: Reached target network-online.target. May 16 00:28:38.079657 systemd[1]: Starting kubelet.service... May 16 00:28:38.341027 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 16 00:28:38.358986 systemd[1]: Finished sshd-keygen.service. May 16 00:28:38.361274 systemd[1]: Starting issuegen.service... May 16 00:28:38.365876 systemd[1]: issuegen.service: Deactivated successfully. May 16 00:28:38.366023 systemd[1]: Finished issuegen.service. May 16 00:28:38.368115 systemd[1]: Starting systemd-user-sessions.service... May 16 00:28:38.374386 systemd[1]: Finished systemd-user-sessions.service. May 16 00:28:38.376950 systemd[1]: Started getty@tty1.service. May 16 00:28:38.379067 systemd[1]: Started serial-getty@ttyAMA0.service. May 16 00:28:38.379973 systemd[1]: Reached target getty.target. May 16 00:28:38.674086 systemd[1]: Started kubelet.service. May 16 00:28:38.675312 systemd[1]: Reached target multi-user.target. May 16 00:28:38.677197 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 16 00:28:38.683910 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 16 00:28:38.684071 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 16 00:28:38.685054 systemd[1]: Startup finished in 606ms (kernel) + 4.765s (initrd) + 4.869s (userspace) = 10.241s. May 16 00:28:39.136026 kubelet[1275]: E0516 00:28:39.135967 1275 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:28:39.137918 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:28:39.138045 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:28:42.069669 systemd[1]: Created slice system-sshd.slice. May 16 00:28:42.070926 systemd[1]: Started sshd@0-10.0.0.9:22-10.0.0.1:37834.service. May 16 00:28:42.120345 sshd[1284]: Accepted publickey for core from 10.0.0.1 port 37834 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:28:42.122809 sshd[1284]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.135554 systemd-logind[1202]: New session 1 of user core. May 16 00:28:42.136507 systemd[1]: Created slice user-500.slice. May 16 00:28:42.137850 systemd[1]: Starting user-runtime-dir@500.service... May 16 00:28:42.146224 systemd[1]: Finished user-runtime-dir@500.service. May 16 00:28:42.148651 systemd[1]: Starting user@500.service... May 16 00:28:42.151515 (systemd)[1287]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.217325 systemd[1287]: Queued start job for default target default.target. May 16 00:28:42.218077 systemd[1287]: Reached target paths.target. May 16 00:28:42.218259 systemd[1287]: Reached target sockets.target. May 16 00:28:42.218340 systemd[1287]: Reached target timers.target. May 16 00:28:42.218414 systemd[1287]: Reached target basic.target. May 16 00:28:42.218536 systemd[1287]: Reached target default.target. May 16 00:28:42.218624 systemd[1]: Started user@500.service. May 16 00:28:42.218707 systemd[1287]: Startup finished in 61ms. May 16 00:28:42.219620 systemd[1]: Started session-1.scope. May 16 00:28:42.270662 systemd[1]: Started sshd@1-10.0.0.9:22-10.0.0.1:37842.service. May 16 00:28:42.320249 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 37842 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:28:42.322521 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.326438 systemd-logind[1202]: New session 2 of user core. May 16 00:28:42.327650 systemd[1]: Started session-2.scope. May 16 00:28:42.382648 sshd[1296]: pam_unix(sshd:session): session closed for user core May 16 00:28:42.385962 systemd[1]: Started sshd@2-10.0.0.9:22-10.0.0.1:37856.service. May 16 00:28:42.389451 systemd[1]: sshd@1-10.0.0.9:22-10.0.0.1:37842.service: Deactivated successfully. May 16 00:28:42.390059 systemd[1]: session-2.scope: Deactivated successfully. May 16 00:28:42.390599 systemd-logind[1202]: Session 2 logged out. Waiting for processes to exit. May 16 00:28:42.391405 systemd-logind[1202]: Removed session 2. May 16 00:28:42.433346 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 37856 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:28:42.434781 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.438389 systemd-logind[1202]: New session 3 of user core. May 16 00:28:42.439154 systemd[1]: Started session-3.scope. May 16 00:28:42.488421 sshd[1301]: pam_unix(sshd:session): session closed for user core May 16 00:28:42.491350 systemd[1]: sshd@2-10.0.0.9:22-10.0.0.1:37856.service: Deactivated successfully. May 16 00:28:42.491934 systemd[1]: session-3.scope: Deactivated successfully. May 16 00:28:42.492480 systemd-logind[1202]: Session 3 logged out. Waiting for processes to exit. May 16 00:28:42.493617 systemd[1]: Started sshd@3-10.0.0.9:22-10.0.0.1:56090.service. May 16 00:28:42.494280 systemd-logind[1202]: Removed session 3. May 16 00:28:42.538825 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 56090 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:28:42.540709 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.544541 systemd-logind[1202]: New session 4 of user core. May 16 00:28:42.545363 systemd[1]: Started session-4.scope. May 16 00:28:42.606260 sshd[1308]: pam_unix(sshd:session): session closed for user core May 16 00:28:42.609819 systemd[1]: Started sshd@4-10.0.0.9:22-10.0.0.1:56102.service. May 16 00:28:42.610336 systemd[1]: sshd@3-10.0.0.9:22-10.0.0.1:56090.service: Deactivated successfully. May 16 00:28:42.610987 systemd[1]: session-4.scope: Deactivated successfully. May 16 00:28:42.611514 systemd-logind[1202]: Session 4 logged out. Waiting for processes to exit. May 16 00:28:42.612230 systemd-logind[1202]: Removed session 4. May 16 00:28:42.653707 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 56102 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:28:42.655332 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.658388 systemd-logind[1202]: New session 5 of user core. May 16 00:28:42.659231 systemd[1]: Started session-5.scope. May 16 00:28:42.718443 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 16 00:28:42.718682 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:28:42.733386 dbus-daemon[1194]: avc: received setenforce notice (enforcing=1) May 16 00:28:42.735122 sudo[1318]: pam_unix(sudo:session): session closed for user root May 16 00:28:42.739075 sshd[1313]: pam_unix(sshd:session): session closed for user core May 16 00:28:42.743967 systemd[1]: Started sshd@5-10.0.0.9:22-10.0.0.1:56108.service. May 16 00:28:42.748123 systemd[1]: sshd@4-10.0.0.9:22-10.0.0.1:56102.service: Deactivated successfully. May 16 00:28:42.752008 systemd[1]: session-5.scope: Deactivated successfully. May 16 00:28:42.754608 systemd-logind[1202]: Session 5 logged out. Waiting for processes to exit. May 16 00:28:42.758160 systemd-logind[1202]: Removed session 5. May 16 00:28:42.793008 sshd[1321]: Accepted publickey for core from 10.0.0.1 port 56108 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:28:42.794469 sshd[1321]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.798867 systemd[1]: Started session-6.scope. May 16 00:28:42.799225 systemd-logind[1202]: New session 6 of user core. May 16 00:28:42.853039 sudo[1327]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 16 00:28:42.853602 sudo[1327]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:28:42.856333 sudo[1327]: pam_unix(sudo:session): session closed for user root May 16 00:28:42.860937 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 16 00:28:42.861147 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:28:42.886461 systemd[1]: Stopping audit-rules.service... May 16 00:28:42.887000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 16 00:28:42.889481 auditctl[1330]: No rules May 16 00:28:42.889760 systemd[1]: audit-rules.service: Deactivated successfully. May 16 00:28:42.889933 systemd[1]: Stopped audit-rules.service. May 16 00:28:42.891473 systemd[1]: Starting audit-rules.service... May 16 00:28:42.893014 kernel: kauditd_printk_skb: 173 callbacks suppressed May 16 00:28:42.893069 kernel: audit: type=1305 audit(1747355322.887:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 16 00:28:42.893088 kernel: audit: type=1300 audit(1747355322.887:205): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff64aef60 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:42.887000 audit[1330]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff64aef60 a2=420 a3=0 items=0 ppid=1 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:42.887000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 16 00:28:42.900268 kernel: audit: type=1327 audit(1747355322.887:205): proctitle=2F7362696E2F617564697463746C002D44 May 16 00:28:42.900321 kernel: audit: type=1131 audit(1747355322.888:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:42.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:42.913629 augenrules[1347]: No rules May 16 00:28:42.914644 systemd[1]: Finished audit-rules.service. May 16 00:28:42.915486 sudo[1326]: pam_unix(sudo:session): session closed for user root May 16 00:28:42.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:42.914000 audit[1326]: USER_END pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:28:42.921254 kernel: audit: type=1130 audit(1747355322.913:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:42.921298 kernel: audit: type=1106 audit(1747355322.914:208): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:28:42.921706 sshd[1321]: pam_unix(sshd:session): session closed for user core May 16 00:28:42.914000 audit[1326]: CRED_DISP pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:28:42.924644 systemd[1]: Started sshd@6-10.0.0.9:22-10.0.0.1:56124.service. May 16 00:28:42.924823 kernel: audit: type=1104 audit(1747355322.914:209): pid=1326 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:28:42.921000 audit[1321]: USER_END pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:42.925243 systemd[1]: sshd@5-10.0.0.9:22-10.0.0.1:56108.service: Deactivated successfully. May 16 00:28:42.926347 systemd[1]: session-6.scope: Deactivated successfully. May 16 00:28:42.926981 systemd-logind[1202]: Session 6 logged out. Waiting for processes to exit. May 16 00:28:42.927917 systemd-logind[1202]: Removed session 6. May 16 00:28:42.928238 kernel: audit: type=1106 audit(1747355322.921:210): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:42.921000 audit[1321]: CRED_DISP pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:42.930329 kernel: audit: type=1104 audit(1747355322.921:211): pid=1321 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:42.930382 kernel: audit: type=1130 audit(1747355322.921:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.9:22-10.0.0.1:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:42.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.9:22-10.0.0.1:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:42.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.9:22-10.0.0.1:56108 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:42.966000 audit[1352]: USER_ACCT pid=1352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:42.968223 sshd[1352]: Accepted publickey for core from 10.0.0.1 port 56124 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:28:42.967000 audit[1352]: CRED_ACQ pid=1352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:42.967000 audit[1352]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd012bcf0 a2=3 a3=1 items=0 ppid=1 pid=1352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:42.967000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:28:42.969372 sshd[1352]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:28:42.973021 systemd-logind[1202]: New session 7 of user core. May 16 00:28:42.973554 systemd[1]: Started session-7.scope. May 16 00:28:42.976000 audit[1352]: USER_START pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:42.977000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:28:43.025000 audit[1356]: USER_ACCT pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:28:43.027262 sudo[1356]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 16 00:28:43.026000 audit[1356]: CRED_REFR pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:28:43.027755 sudo[1356]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:28:43.028000 audit[1356]: USER_START pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:28:43.120051 systemd[1]: Starting docker.service... May 16 00:28:43.203325 env[1368]: time="2025-05-16T00:28:43.203270100Z" level=info msg="Starting up" May 16 00:28:43.204896 env[1368]: time="2025-05-16T00:28:43.204858220Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 16 00:28:43.204990 env[1368]: time="2025-05-16T00:28:43.204976300Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 16 00:28:43.205122 env[1368]: time="2025-05-16T00:28:43.205103140Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 16 00:28:43.205191 env[1368]: time="2025-05-16T00:28:43.205177660Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 16 00:28:43.207255 env[1368]: time="2025-05-16T00:28:43.207230900Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 16 00:28:43.207255 env[1368]: time="2025-05-16T00:28:43.207252300Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 16 00:28:43.207332 env[1368]: time="2025-05-16T00:28:43.207268020Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 16 00:28:43.207332 env[1368]: time="2025-05-16T00:28:43.207277540Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 16 00:28:43.387528 env[1368]: time="2025-05-16T00:28:43.387423380Z" level=info msg="Loading containers: start." May 16 00:28:43.434000 audit[1402]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.434000 audit[1402]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff860d8f0 a2=0 a3=1 items=0 ppid=1368 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.434000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 16 00:28:43.436000 audit[1404]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.436000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffdc10ccf0 a2=0 a3=1 items=0 ppid=1368 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.436000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 16 00:28:43.438000 audit[1406]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.438000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc6f27ba0 a2=0 a3=1 items=0 ppid=1368 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 16 00:28:43.440000 audit[1408]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.440000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffdbbca480 a2=0 a3=1 items=0 ppid=1368 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 16 00:28:43.442000 audit[1410]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.442000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff8a55d00 a2=0 a3=1 items=0 ppid=1368 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 16 00:28:43.469000 audit[1415]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.469000 audit[1415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffed5147e0 a2=0 a3=1 items=0 ppid=1368 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.469000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 16 00:28:43.477000 audit[1417]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.477000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd1c51f30 a2=0 a3=1 items=0 ppid=1368 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.477000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 16 00:28:43.479000 audit[1419]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.479000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff0cfe390 a2=0 a3=1 items=0 ppid=1368 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.479000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 16 00:28:43.481000 audit[1421]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.481000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffeb562c00 a2=0 a3=1 items=0 ppid=1368 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.481000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:28:43.489000 audit[1425]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.489000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff472ba80 a2=0 a3=1 items=0 ppid=1368 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.489000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 16 00:28:43.498000 audit[1426]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.498000 audit[1426]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd6794900 a2=0 a3=1 items=0 ppid=1368 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.498000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:28:43.510201 kernel: Initializing XFRM netlink socket May 16 00:28:43.540889 env[1368]: time="2025-05-16T00:28:43.540832180Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 16 00:28:43.564000 audit[1434]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.564000 audit[1434]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc1962b90 a2=0 a3=1 items=0 ppid=1368 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.564000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 16 00:28:43.576000 audit[1437]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.576000 audit[1437]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc73a3b30 a2=0 a3=1 items=0 ppid=1368 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 16 00:28:43.579000 audit[1440]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.579000 audit[1440]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc1c02670 a2=0 a3=1 items=0 ppid=1368 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.579000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 16 00:28:43.581000 audit[1442]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.581000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe4c38fe0 a2=0 a3=1 items=0 ppid=1368 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 16 00:28:43.583000 audit[1444]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.583000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffff588d1e0 a2=0 a3=1 items=0 ppid=1368 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 16 00:28:43.586000 audit[1446]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.586000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffdb715150 a2=0 a3=1 items=0 ppid=1368 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.586000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 16 00:28:43.588000 audit[1448]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.588000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffef66fb70 a2=0 a3=1 items=0 ppid=1368 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.588000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 16 00:28:43.598000 audit[1451]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.598000 audit[1451]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe235c8b0 a2=0 a3=1 items=0 ppid=1368 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 16 00:28:43.600000 audit[1453]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.600000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffc1715fc0 a2=0 a3=1 items=0 ppid=1368 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 16 00:28:43.602000 audit[1455]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.602000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffeebba700 a2=0 a3=1 items=0 ppid=1368 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.602000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 16 00:28:43.603000 audit[1457]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.603000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdbe18a80 a2=0 a3=1 items=0 ppid=1368 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.603000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 16 00:28:43.605245 systemd-networkd[1043]: docker0: Link UP May 16 00:28:43.620000 audit[1461]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.620000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc8a2f280 a2=0 a3=1 items=0 ppid=1368 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.620000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 16 00:28:43.630000 audit[1462]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1462 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:28:43.630000 audit[1462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff11d72b0 a2=0 a3=1 items=0 ppid=1368 pid=1462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:28:43.630000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:28:43.632259 env[1368]: time="2025-05-16T00:28:43.632220580Z" level=info msg="Loading containers: done." May 16 00:28:43.671349 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1880747313-merged.mount: Deactivated successfully. May 16 00:28:43.685927 env[1368]: time="2025-05-16T00:28:43.685867060Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 16 00:28:43.686115 env[1368]: time="2025-05-16T00:28:43.686074900Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 16 00:28:43.686244 env[1368]: time="2025-05-16T00:28:43.686216300Z" level=info msg="Daemon has completed initialization" May 16 00:28:43.705372 systemd[1]: Started docker.service. May 16 00:28:43.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:43.712832 env[1368]: time="2025-05-16T00:28:43.712653540Z" level=info msg="API listen on /run/docker.sock" May 16 00:28:44.527382 env[1215]: time="2025-05-16T00:28:44.527338660Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\"" May 16 00:28:45.522566 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2133847976.mount: Deactivated successfully. May 16 00:28:46.822709 env[1215]: time="2025-05-16T00:28:46.822655820Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:46.834590 env[1215]: time="2025-05-16T00:28:46.834538700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:42968274c3d27c41cdc146f5442f122c1c74960e299c13e2f348d2fe835a9134,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:46.838850 env[1215]: time="2025-05-16T00:28:46.838813100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:46.840480 env[1215]: time="2025-05-16T00:28:46.840425140Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:0bee1bf751fe06009678c0cde7545443ba3a8d2edf71cea4c69cbb5774b9bf47,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:46.841502 env[1215]: time="2025-05-16T00:28:46.841460220Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.32.5\" returns image reference \"sha256:42968274c3d27c41cdc146f5442f122c1c74960e299c13e2f348d2fe835a9134\"" May 16 00:28:46.842135 env[1215]: time="2025-05-16T00:28:46.842072540Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\"" May 16 00:28:48.734560 env[1215]: time="2025-05-16T00:28:48.734512260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:48.741290 env[1215]: time="2025-05-16T00:28:48.741201740Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:82042044d6ea1f1e5afda9c7351883800adbde447314786c4e5a2fd9e42aab09,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:48.742979 env[1215]: time="2025-05-16T00:28:48.742927300Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:48.745699 env[1215]: time="2025-05-16T00:28:48.745280260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:79bcf2f5e614c336c02dcea9dfcdf485d7297aed6a21239a99c87f7164f9baca,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:48.746009 env[1215]: time="2025-05-16T00:28:48.745975900Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.32.5\" returns image reference \"sha256:82042044d6ea1f1e5afda9c7351883800adbde447314786c4e5a2fd9e42aab09\"" May 16 00:28:48.746697 env[1215]: time="2025-05-16T00:28:48.746581380Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\"" May 16 00:28:49.351261 kernel: kauditd_printk_skb: 84 callbacks suppressed May 16 00:28:49.351393 kernel: audit: type=1130 audit(1747355329.344:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:49.351422 kernel: audit: type=1131 audit(1747355329.344:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:49.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:49.344000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:49.345688 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 16 00:28:49.345849 systemd[1]: Stopped kubelet.service. May 16 00:28:49.350700 systemd[1]: Starting kubelet.service... May 16 00:28:49.461557 systemd[1]: Started kubelet.service. May 16 00:28:49.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:49.465230 kernel: audit: type=1130 audit(1747355329.460:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:49.581187 kubelet[1504]: E0516 00:28:49.581128 1504 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:28:49.584443 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:28:49.584595 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:28:49.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:28:49.589359 kernel: audit: type=1131 audit(1747355329.583:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:28:50.176008 env[1215]: time="2025-05-16T00:28:50.175948180Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:50.178240 env[1215]: time="2025-05-16T00:28:50.178201460Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e149336437f90109dad736c8a42e4b73c137a66579be8f3b9a456bcc62af3f9b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:50.179836 env[1215]: time="2025-05-16T00:28:50.179799220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:50.182179 env[1215]: time="2025-05-16T00:28:50.182136660Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:f0f39d8b9808c407cacb3a46a5a9ce4d4a4a7cf3b674ba4bd221f5bc90051d2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:50.182922 env[1215]: time="2025-05-16T00:28:50.182880860Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.32.5\" returns image reference \"sha256:e149336437f90109dad736c8a42e4b73c137a66579be8f3b9a456bcc62af3f9b\"" May 16 00:28:50.183371 env[1215]: time="2025-05-16T00:28:50.183344940Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\"" May 16 00:28:51.284962 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1841198708.mount: Deactivated successfully. May 16 00:28:51.758580 env[1215]: time="2025-05-16T00:28:51.758526900Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:51.760124 env[1215]: time="2025-05-16T00:28:51.760085260Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:69b7afc06f22edcae3b6a7d80cdacb488a5415fd605e89534679e5ebc41375fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:51.761718 env[1215]: time="2025-05-16T00:28:51.761692900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.32.5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:51.763188 env[1215]: time="2025-05-16T00:28:51.763153300Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9dc6553459c3319525ba4090a780db1a133d5dee68c08e07f9b9d6ba83b42a0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:51.763680 env[1215]: time="2025-05-16T00:28:51.763636020Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.32.5\" returns image reference \"sha256:69b7afc06f22edcae3b6a7d80cdacb488a5415fd605e89534679e5ebc41375fc\"" May 16 00:28:51.764484 env[1215]: time="2025-05-16T00:28:51.764431780Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 16 00:28:52.486084 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount361447734.mount: Deactivated successfully. May 16 00:28:53.688489 env[1215]: time="2025-05-16T00:28:53.688421980Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:53.690831 env[1215]: time="2025-05-16T00:28:53.690779100Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:53.693950 env[1215]: time="2025-05-16T00:28:53.693899740Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:53.694781 env[1215]: time="2025-05-16T00:28:53.694759980Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:53.696524 env[1215]: time="2025-05-16T00:28:53.696487100Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:2f6c962e7b8311337352d9fdea917da2184d9919f4da7695bc2a6517cf392fe4\"" May 16 00:28:53.697121 env[1215]: time="2025-05-16T00:28:53.697098180Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 16 00:28:54.238850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2132079077.mount: Deactivated successfully. May 16 00:28:54.243070 env[1215]: time="2025-05-16T00:28:54.243020740Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:54.244449 env[1215]: time="2025-05-16T00:28:54.244389620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:54.245794 env[1215]: time="2025-05-16T00:28:54.245768140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:54.247137 env[1215]: time="2025-05-16T00:28:54.247098620Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:54.247762 env[1215]: time="2025-05-16T00:28:54.247728620Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 16 00:28:54.248206 env[1215]: time="2025-05-16T00:28:54.248182020Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\"" May 16 00:28:54.839737 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1789540212.mount: Deactivated successfully. May 16 00:28:56.966144 env[1215]: time="2025-05-16T00:28:56.966090900Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:56.968836 env[1215]: time="2025-05-16T00:28:56.968792020Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:56.970741 env[1215]: time="2025-05-16T00:28:56.970714220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.16-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:56.973551 env[1215]: time="2025-05-16T00:28:56.973509260Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:c6a9d11cc5c04b114ccdef39a9265eeef818e3d02f5359be035ae784097fdec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:28:56.974371 env[1215]: time="2025-05-16T00:28:56.974334140Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.16-0\" returns image reference \"sha256:7fc9d4aa817aa6a3e549f3cd49d1f7b496407be979fc36dd5f356d59ce8c3a82\"" May 16 00:28:59.595709 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 16 00:28:59.595877 systemd[1]: Stopped kubelet.service. May 16 00:28:59.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:59.597245 systemd[1]: Starting kubelet.service... May 16 00:28:59.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:59.599721 kernel: audit: type=1130 audit(1747355339.594:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:59.599788 kernel: audit: type=1131 audit(1747355339.594:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:59.700101 systemd[1]: Started kubelet.service. May 16 00:28:59.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:59.703194 kernel: audit: type=1130 audit(1747355339.699:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:28:59.749367 kubelet[1539]: E0516 00:28:59.749313 1539 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:28:59.751406 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:28:59.751546 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:28:59.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:28:59.755238 kernel: audit: type=1131 audit(1747355339.750:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:29:02.613521 systemd[1]: Stopped kubelet.service. May 16 00:29:02.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:02.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:02.615633 systemd[1]: Starting kubelet.service... May 16 00:29:02.617389 kernel: audit: type=1130 audit(1747355342.612:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:02.617477 kernel: audit: type=1131 audit(1747355342.612:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:02.647124 systemd[1]: Reloading. May 16 00:29:02.699053 /usr/lib/systemd/system-generators/torcx-generator[1574]: time="2025-05-16T00:29:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:29:02.699508 /usr/lib/systemd/system-generators/torcx-generator[1574]: time="2025-05-16T00:29:02Z" level=info msg="torcx already run" May 16 00:29:02.838091 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:29:02.838377 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:29:02.855537 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:29:02.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.912986 kernel: audit: type=1400 audit(1747355342.908:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.913046 kernel: audit: type=1400 audit(1747355342.908:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.913066 kernel: audit: type=1400 audit(1747355342.908:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914664 kernel: audit: type=1400 audit(1747355342.908:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.908000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit: BPF prog-id=40 op=LOAD May 16 00:29:02.910000 audit: BPF prog-id=24 op=UNLOAD May 16 00:29:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.910000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit: BPF prog-id=41 op=LOAD May 16 00:29:02.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.913000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.913000 audit: BPF prog-id=42 op=LOAD May 16 00:29:02.913000 audit: BPF prog-id=25 op=UNLOAD May 16 00:29:02.913000 audit: BPF prog-id=26 op=UNLOAD May 16 00:29:02.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.916000 audit: BPF prog-id=43 op=LOAD May 16 00:29:02.916000 audit: BPF prog-id=27 op=UNLOAD May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit: BPF prog-id=44 op=LOAD May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit: BPF prog-id=45 op=LOAD May 16 00:29:02.917000 audit: BPF prog-id=28 op=UNLOAD May 16 00:29:02.917000 audit: BPF prog-id=29 op=UNLOAD May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit: BPF prog-id=46 op=LOAD May 16 00:29:02.918000 audit: BPF prog-id=38 op=UNLOAD May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit: BPF prog-id=47 op=LOAD May 16 00:29:02.918000 audit: BPF prog-id=35 op=UNLOAD May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit: BPF prog-id=48 op=LOAD May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.918000 audit: BPF prog-id=49 op=LOAD May 16 00:29:02.918000 audit: BPF prog-id=36 op=UNLOAD May 16 00:29:02.918000 audit: BPF prog-id=37 op=UNLOAD May 16 00:29:02.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.919000 audit: BPF prog-id=50 op=LOAD May 16 00:29:02.919000 audit: BPF prog-id=33 op=UNLOAD May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit: BPF prog-id=51 op=LOAD May 16 00:29:02.920000 audit: BPF prog-id=34 op=UNLOAD May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit: BPF prog-id=52 op=LOAD May 16 00:29:02.920000 audit: BPF prog-id=30 op=UNLOAD May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit: BPF prog-id=53 op=LOAD May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:02.920000 audit: BPF prog-id=54 op=LOAD May 16 00:29:02.920000 audit: BPF prog-id=31 op=UNLOAD May 16 00:29:02.920000 audit: BPF prog-id=32 op=UNLOAD May 16 00:29:02.932097 systemd[1]: Started kubelet.service. May 16 00:29:02.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:02.935820 systemd[1]: Stopping kubelet.service... May 16 00:29:02.936745 systemd[1]: kubelet.service: Deactivated successfully. May 16 00:29:02.936941 systemd[1]: Stopped kubelet.service. May 16 00:29:02.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:02.938557 systemd[1]: Starting kubelet.service... May 16 00:29:03.038757 systemd[1]: Started kubelet.service. May 16 00:29:03.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:03.075136 kubelet[1624]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:29:03.075136 kubelet[1624]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 16 00:29:03.075136 kubelet[1624]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:29:03.075499 kubelet[1624]: I0516 00:29:03.075214 1624 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 16 00:29:03.685684 kubelet[1624]: I0516 00:29:03.685638 1624 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 16 00:29:03.685684 kubelet[1624]: I0516 00:29:03.685671 1624 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 16 00:29:03.685959 kubelet[1624]: I0516 00:29:03.685935 1624 server.go:954] "Client rotation is on, will bootstrap in background" May 16 00:29:03.737644 kubelet[1624]: E0516 00:29:03.737603 1624 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.9:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:03.738614 kubelet[1624]: I0516 00:29:03.738600 1624 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 16 00:29:03.748231 kubelet[1624]: E0516 00:29:03.748184 1624 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 16 00:29:03.748231 kubelet[1624]: I0516 00:29:03.748220 1624 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 16 00:29:03.750954 kubelet[1624]: I0516 00:29:03.750931 1624 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 16 00:29:03.751714 kubelet[1624]: I0516 00:29:03.751655 1624 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 16 00:29:03.751892 kubelet[1624]: I0516 00:29:03.751712 1624 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 16 00:29:03.751977 kubelet[1624]: I0516 00:29:03.751953 1624 topology_manager.go:138] "Creating topology manager with none policy" May 16 00:29:03.751977 kubelet[1624]: I0516 00:29:03.751963 1624 container_manager_linux.go:304] "Creating device plugin manager" May 16 00:29:03.752181 kubelet[1624]: I0516 00:29:03.752153 1624 state_mem.go:36] "Initialized new in-memory state store" May 16 00:29:03.754876 kubelet[1624]: I0516 00:29:03.754849 1624 kubelet.go:446] "Attempting to sync node with API server" May 16 00:29:03.754876 kubelet[1624]: I0516 00:29:03.754878 1624 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 16 00:29:03.754946 kubelet[1624]: I0516 00:29:03.754898 1624 kubelet.go:352] "Adding apiserver pod source" May 16 00:29:03.754946 kubelet[1624]: I0516 00:29:03.754908 1624 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 16 00:29:03.756195 kubelet[1624]: W0516 00:29:03.756119 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:03.756321 kubelet[1624]: E0516 00:29:03.756301 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:03.756525 kubelet[1624]: W0516 00:29:03.756489 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.9:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:03.756580 kubelet[1624]: E0516 00:29:03.756545 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.9:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:03.759796 kubelet[1624]: I0516 00:29:03.759778 1624 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 16 00:29:03.760526 kubelet[1624]: I0516 00:29:03.760507 1624 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 16 00:29:03.760725 kubelet[1624]: W0516 00:29:03.760713 1624 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 16 00:29:03.761721 kubelet[1624]: I0516 00:29:03.761702 1624 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 16 00:29:03.761825 kubelet[1624]: I0516 00:29:03.761814 1624 server.go:1287] "Started kubelet" May 16 00:29:03.781000 audit[1624]: AVC avc: denied { mac_admin } for pid=1624 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:03.781000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:29:03.781000 audit[1624]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007d7560 a1=4000241d58 a2=40007d7530 a3=25 items=0 ppid=1 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.781000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:29:03.783363 kubelet[1624]: I0516 00:29:03.783325 1624 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 16 00:29:03.782000 audit[1624]: AVC avc: denied { mac_admin } for pid=1624 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:03.782000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:29:03.782000 audit[1624]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000421d60 a1=4000241d70 a2=40007d75f0 a3=25 items=0 ppid=1 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.782000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:29:03.783635 kubelet[1624]: I0516 00:29:03.783619 1624 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 16 00:29:03.783775 kubelet[1624]: I0516 00:29:03.783762 1624 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 16 00:29:03.787127 kubelet[1624]: I0516 00:29:03.786985 1624 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 16 00:29:03.787401 kubelet[1624]: I0516 00:29:03.787338 1624 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 16 00:29:03.787528 kubelet[1624]: I0516 00:29:03.787495 1624 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 16 00:29:03.788633 kubelet[1624]: I0516 00:29:03.788602 1624 server.go:479] "Adding debug handlers to kubelet server" May 16 00:29:03.787000 audit[1637]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1637 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.787000 audit[1637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffde4cd280 a2=0 a3=1 items=0 ppid=1624 pid=1637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 16 00:29:03.789485 kubelet[1624]: I0516 00:29:03.789456 1624 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 16 00:29:03.789647 kubelet[1624]: E0516 00:29:03.789620 1624 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:29:03.789687 kubelet[1624]: I0516 00:29:03.789661 1624 volume_manager.go:297] "Starting Kubelet Volume Manager" May 16 00:29:03.789894 kubelet[1624]: I0516 00:29:03.789868 1624 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 16 00:29:03.789963 kubelet[1624]: I0516 00:29:03.789948 1624 reconciler.go:26] "Reconciler: start to sync state" May 16 00:29:03.790372 kubelet[1624]: W0516 00:29:03.790317 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:03.790667 kubelet[1624]: E0516 00:29:03.790632 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:03.790945 kubelet[1624]: E0516 00:29:03.788259 1624 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.9:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.9:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fda6d614d48dc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-16 00:29:03.7617871 +0000 UTC m=+0.718376361,LastTimestamp:2025-05-16 00:29:03.7617871 +0000 UTC m=+0.718376361,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 16 00:29:03.791067 kubelet[1624]: E0516 00:29:03.791046 1624 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 16 00:29:03.791191 kubelet[1624]: I0516 00:29:03.791152 1624 factory.go:221] Registration of the systemd container factory successfully May 16 00:29:03.789000 audit[1638]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.789000 audit[1638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc81f9e70 a2=0 a3=1 items=0 ppid=1624 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 16 00:29:03.791445 kubelet[1624]: I0516 00:29:03.791314 1624 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 16 00:29:03.791682 kubelet[1624]: E0516 00:29:03.791651 1624 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.9:6443: connect: connection refused" interval="200ms" May 16 00:29:03.792505 kubelet[1624]: I0516 00:29:03.792480 1624 factory.go:221] Registration of the containerd container factory successfully May 16 00:29:03.794000 audit[1642]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.794000 audit[1642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff28831d0 a2=0 a3=1 items=0 ppid=1624 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.794000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:29:03.796000 audit[1644]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.796000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff8909c80 a2=0 a3=1 items=0 ppid=1624 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.796000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:29:03.803000 audit[1649]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.803000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff498dc40 a2=0 a3=1 items=0 ppid=1624 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.803000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 16 00:29:03.806136 kubelet[1624]: I0516 00:29:03.806094 1624 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 16 00:29:03.805000 audit[1652]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:03.805000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc7b8e720 a2=0 a3=1 items=0 ppid=1624 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.805000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 16 00:29:03.807401 kubelet[1624]: I0516 00:29:03.807371 1624 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 16 00:29:03.807484 kubelet[1624]: I0516 00:29:03.807475 1624 status_manager.go:227] "Starting to sync pod status with apiserver" May 16 00:29:03.808015 kubelet[1624]: I0516 00:29:03.807997 1624 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 16 00:29:03.808475 kubelet[1624]: I0516 00:29:03.808448 1624 kubelet.go:2382] "Starting kubelet main sync loop" May 16 00:29:03.808606 kubelet[1624]: E0516 00:29:03.808588 1624 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 16 00:29:03.807000 audit[1654]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:03.807000 audit[1654]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff73cb6f0 a2=0 a3=1 items=0 ppid=1624 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 16 00:29:03.809421 kubelet[1624]: I0516 00:29:03.809401 1624 cpu_manager.go:221] "Starting CPU manager" policy="none" May 16 00:29:03.809494 kubelet[1624]: I0516 00:29:03.809483 1624 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 16 00:29:03.809551 kubelet[1624]: I0516 00:29:03.809542 1624 state_mem.go:36] "Initialized new in-memory state store" May 16 00:29:03.808000 audit[1653]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.808000 audit[1653]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffd381220 a2=0 a3=1 items=0 ppid=1624 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.808000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 16 00:29:03.809794 kubelet[1624]: W0516 00:29:03.809755 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:03.809824 kubelet[1624]: E0516 00:29:03.809808 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:03.809000 audit[1655]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:03.809000 audit[1655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe4369700 a2=0 a3=1 items=0 ppid=1624 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.809000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 16 00:29:03.809000 audit[1656]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.809000 audit[1656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeafcaaf0 a2=0 a3=1 items=0 ppid=1624 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.809000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 16 00:29:03.810000 audit[1657]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:03.810000 audit[1657]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcbe97d80 a2=0 a3=1 items=0 ppid=1624 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.810000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 16 00:29:03.811000 audit[1658]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:03.811000 audit[1658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5200030 a2=0 a3=1 items=0 ppid=1624 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.811000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 16 00:29:03.887275 kubelet[1624]: I0516 00:29:03.887248 1624 policy_none.go:49] "None policy: Start" May 16 00:29:03.887413 kubelet[1624]: I0516 00:29:03.887400 1624 memory_manager.go:186] "Starting memorymanager" policy="None" May 16 00:29:03.887490 kubelet[1624]: I0516 00:29:03.887481 1624 state_mem.go:35] "Initializing new in-memory state store" May 16 00:29:03.889844 kubelet[1624]: E0516 00:29:03.889803 1624 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:29:03.893291 systemd[1]: Created slice kubepods.slice. May 16 00:29:03.898129 systemd[1]: Created slice kubepods-burstable.slice. May 16 00:29:03.900996 systemd[1]: Created slice kubepods-besteffort.slice. May 16 00:29:03.902376 kubelet[1624]: W0516 00:29:03.902347 1624 helpers.go:245] readString: Failed to read "/sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective": read /sys/fs/cgroup/kubepods.slice/kubepods-besteffort.slice/cpuset.cpus.effective: no such device May 16 00:29:03.908921 kubelet[1624]: E0516 00:29:03.908880 1624 kubelet.go:2406] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 16 00:29:03.916136 kubelet[1624]: I0516 00:29:03.916110 1624 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 16 00:29:03.915000 audit[1624]: AVC avc: denied { mac_admin } for pid=1624 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:03.915000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:29:03.915000 audit[1624]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400098b4d0 a1=40003e17a0 a2=400098b4a0 a3=25 items=0 ppid=1 pid=1624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:03.915000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:29:03.916722 kubelet[1624]: I0516 00:29:03.916427 1624 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 16 00:29:03.916930 kubelet[1624]: I0516 00:29:03.916911 1624 eviction_manager.go:189] "Eviction manager: starting control loop" May 16 00:29:03.917043 kubelet[1624]: I0516 00:29:03.917005 1624 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 16 00:29:03.917678 kubelet[1624]: I0516 00:29:03.917651 1624 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 16 00:29:03.917929 kubelet[1624]: E0516 00:29:03.917896 1624 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 16 00:29:03.917980 kubelet[1624]: E0516 00:29:03.917957 1624 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 16 00:29:03.993211 kubelet[1624]: E0516 00:29:03.992353 1624 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.9:6443: connect: connection refused" interval="400ms" May 16 00:29:04.018626 kubelet[1624]: I0516 00:29:04.018597 1624 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:29:04.019215 kubelet[1624]: E0516 00:29:04.019179 1624 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.9:6443/api/v1/nodes\": dial tcp 10.0.0.9:6443: connect: connection refused" node="localhost" May 16 00:29:04.115770 systemd[1]: Created slice kubepods-burstable-pod3a43cdafcbc42cdd2a3963bea1834cd6.slice. May 16 00:29:04.123819 kubelet[1624]: E0516 00:29:04.123792 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:04.125476 systemd[1]: Created slice kubepods-burstable-pod7c751acbcd1525da2f1a64e395f86bdd.slice. May 16 00:29:04.126739 kubelet[1624]: E0516 00:29:04.126713 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:04.129011 systemd[1]: Created slice kubepods-burstable-pod447e79232307504a6964f3be51e3d64d.slice. May 16 00:29:04.130265 kubelet[1624]: E0516 00:29:04.130242 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:04.191554 kubelet[1624]: I0516 00:29:04.191504 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3a43cdafcbc42cdd2a3963bea1834cd6-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3a43cdafcbc42cdd2a3963bea1834cd6\") " pod="kube-system/kube-apiserver-localhost" May 16 00:29:04.191554 kubelet[1624]: I0516 00:29:04.191554 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:04.191668 kubelet[1624]: I0516 00:29:04.191597 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:04.191668 kubelet[1624]: I0516 00:29:04.191616 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:04.191668 kubelet[1624]: I0516 00:29:04.191633 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:04.191668 kubelet[1624]: I0516 00:29:04.191650 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/447e79232307504a6964f3be51e3d64d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"447e79232307504a6964f3be51e3d64d\") " pod="kube-system/kube-scheduler-localhost" May 16 00:29:04.191774 kubelet[1624]: I0516 00:29:04.191674 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3a43cdafcbc42cdd2a3963bea1834cd6-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3a43cdafcbc42cdd2a3963bea1834cd6\") " pod="kube-system/kube-apiserver-localhost" May 16 00:29:04.191774 kubelet[1624]: I0516 00:29:04.191690 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3a43cdafcbc42cdd2a3963bea1834cd6-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3a43cdafcbc42cdd2a3963bea1834cd6\") " pod="kube-system/kube-apiserver-localhost" May 16 00:29:04.191774 kubelet[1624]: I0516 00:29:04.191707 1624 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:04.220553 kubelet[1624]: I0516 00:29:04.220526 1624 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:29:04.221045 kubelet[1624]: E0516 00:29:04.221013 1624 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.9:6443/api/v1/nodes\": dial tcp 10.0.0.9:6443: connect: connection refused" node="localhost" May 16 00:29:04.394653 kubelet[1624]: E0516 00:29:04.394605 1624 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.9:6443: connect: connection refused" interval="800ms" May 16 00:29:04.425002 kubelet[1624]: E0516 00:29:04.424966 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:04.425674 env[1215]: time="2025-05-16T00:29:04.425585380Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3a43cdafcbc42cdd2a3963bea1834cd6,Namespace:kube-system,Attempt:0,}" May 16 00:29:04.427138 kubelet[1624]: E0516 00:29:04.427117 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:04.427508 env[1215]: time="2025-05-16T00:29:04.427477100Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7c751acbcd1525da2f1a64e395f86bdd,Namespace:kube-system,Attempt:0,}" May 16 00:29:04.430846 kubelet[1624]: E0516 00:29:04.430821 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:04.431300 env[1215]: time="2025-05-16T00:29:04.431229740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:447e79232307504a6964f3be51e3d64d,Namespace:kube-system,Attempt:0,}" May 16 00:29:04.618983 kubelet[1624]: W0516 00:29:04.618915 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:04.619128 kubelet[1624]: E0516 00:29:04.618989 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.9:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:04.622351 kubelet[1624]: I0516 00:29:04.622327 1624 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:29:04.622664 kubelet[1624]: E0516 00:29:04.622640 1624 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.9:6443/api/v1/nodes\": dial tcp 10.0.0.9:6443: connect: connection refused" node="localhost" May 16 00:29:04.884489 kubelet[1624]: W0516 00:29:04.884376 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.9:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:04.884489 kubelet[1624]: E0516 00:29:04.884455 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.9:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:05.015159 kubelet[1624]: W0516 00:29:05.015057 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:05.015159 kubelet[1624]: E0516 00:29:05.015125 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.9:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:05.072202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2750963394.mount: Deactivated successfully. May 16 00:29:05.075987 env[1215]: time="2025-05-16T00:29:05.075907340Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.078650 env[1215]: time="2025-05-16T00:29:05.078603900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.080115 env[1215]: time="2025-05-16T00:29:05.080084260Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.080961 env[1215]: time="2025-05-16T00:29:05.080933820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.082720 env[1215]: time="2025-05-16T00:29:05.082678860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.084157 env[1215]: time="2025-05-16T00:29:05.084125460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.086678 env[1215]: time="2025-05-16T00:29:05.086645380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.089924 env[1215]: time="2025-05-16T00:29:05.089889380Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.091910 env[1215]: time="2025-05-16T00:29:05.091875060Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.093492 env[1215]: time="2025-05-16T00:29:05.093465860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.094349 env[1215]: time="2025-05-16T00:29:05.094326460Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.095273 env[1215]: time="2025-05-16T00:29:05.095245220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:05.157984 env[1215]: time="2025-05-16T00:29:05.156534700Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:05.157984 env[1215]: time="2025-05-16T00:29:05.156589780Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:05.157984 env[1215]: time="2025-05-16T00:29:05.156602260Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:05.157984 env[1215]: time="2025-05-16T00:29:05.156520980Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:05.157984 env[1215]: time="2025-05-16T00:29:05.156562700Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:05.157984 env[1215]: time="2025-05-16T00:29:05.156573260Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:05.157984 env[1215]: time="2025-05-16T00:29:05.156987660Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3cd3d1b44b6e0ba54466cd18e6b1d0c534291df413adc023db50bb056222cc25 pid=1684 runtime=io.containerd.runc.v2 May 16 00:29:05.158393 env[1215]: time="2025-05-16T00:29:05.157990340Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:05.158393 env[1215]: time="2025-05-16T00:29:05.158033900Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:05.158393 env[1215]: time="2025-05-16T00:29:05.158045020Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:05.158532 env[1215]: time="2025-05-16T00:29:05.158485020Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5fbb79c55dddb7d3c3c3d1c12fd0dc0975962aed157ad898a94d9278c03d4540 pid=1686 runtime=io.containerd.runc.v2 May 16 00:29:05.159696 env[1215]: time="2025-05-16T00:29:05.159604300Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/176079e0dbf15fd0776c9558ce86c58692dda2b99ddec63a76e78e42f07f0d69 pid=1685 runtime=io.containerd.runc.v2 May 16 00:29:05.171212 systemd[1]: Started cri-containerd-176079e0dbf15fd0776c9558ce86c58692dda2b99ddec63a76e78e42f07f0d69.scope. May 16 00:29:05.172192 systemd[1]: Started cri-containerd-5fbb79c55dddb7d3c3c3d1c12fd0dc0975962aed157ad898a94d9278c03d4540.scope. May 16 00:29:05.180998 systemd[1]: Started cri-containerd-3cd3d1b44b6e0ba54466cd18e6b1d0c534291df413adc023db50bb056222cc25.scope. May 16 00:29:05.195972 kubelet[1624]: E0516 00:29:05.195914 1624 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.9:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.9:6443: connect: connection refused" interval="1.6s" May 16 00:29:05.224467 kernel: kauditd_printk_skb: 219 callbacks suppressed May 16 00:29:05.224587 kernel: audit: type=1400 audit(1747355345.216:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.224617 kernel: audit: type=1400 audit(1747355345.216:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.224636 kernel: audit: type=1400 audit(1747355345.216:449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.227106 kernel: audit: type=1400 audit(1747355345.216:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.229469 kernel: audit: type=1400 audit(1747355345.217:451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.229514 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 16 00:29:05.229536 kernel: audit: type=1400 audit(1747355345.217:452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.231937 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 16 00:29:05.231984 kernel: audit: type=1400 audit(1747355345.217:453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.232001 kernel: audit: type=1400 audit(1747355345.217:454): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit: BPF prog-id=55 op=LOAD May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1685 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137363037396530646266313566643037373663393535386365383663 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1685 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137363037396530646266313566643037373663393535386365383663 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit: BPF prog-id=56 op=LOAD May 16 00:29:05.217000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1685 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137363037396530646266313566643037373663393535386365383663 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.217000 audit: BPF prog-id=57 op=LOAD May 16 00:29:05.217000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1685 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137363037396530646266313566643037373663393535386365383663 May 16 00:29:05.219000 audit: BPF prog-id=57 op=UNLOAD May 16 00:29:05.219000 audit: BPF prog-id=56 op=UNLOAD May 16 00:29:05.219000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.219000 audit: BPF prog-id=58 op=LOAD May 16 00:29:05.219000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1685 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137363037396530646266313566643037373663393535386365383663 May 16 00:29:05.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.235000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit: BPF prog-id=59 op=LOAD May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1686 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626237396335356464646237643363336333643163313266643064 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1686 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626237396335356464646237643363336333643163313266643064 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit: BPF prog-id=60 op=LOAD May 16 00:29:05.236000 audit[1713]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1686 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626237396335356464646237643363336333643163313266643064 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit: BPF prog-id=61 op=LOAD May 16 00:29:05.236000 audit[1713]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1686 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626237396335356464646237643363336333643163313266643064 May 16 00:29:05.236000 audit: BPF prog-id=61 op=UNLOAD May 16 00:29:05.236000 audit: BPF prog-id=60 op=UNLOAD May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { perfmon } for pid=1713 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit[1713]: AVC avc: denied { bpf } for pid=1713 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.236000 audit: BPF prog-id=62 op=LOAD May 16 00:29:05.236000 audit[1713]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1686 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566626237396335356464646237643363336333643163313266643064 May 16 00:29:05.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit: BPF prog-id=63 op=LOAD May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1684 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643364316234346236653062613534343636636431386536623164 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1684 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643364316234346236653062613534343636636431386536623164 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit: BPF prog-id=64 op=LOAD May 16 00:29:05.237000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1684 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643364316234346236653062613534343636636431386536623164 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit: BPF prog-id=65 op=LOAD May 16 00:29:05.237000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1684 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643364316234346236653062613534343636636431386536623164 May 16 00:29:05.237000 audit: BPF prog-id=65 op=UNLOAD May 16 00:29:05.237000 audit: BPF prog-id=64 op=UNLOAD May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { perfmon } for pid=1712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit[1712]: AVC avc: denied { bpf } for pid=1712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.237000 audit: BPF prog-id=66 op=LOAD May 16 00:29:05.237000 audit[1712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1684 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363643364316234346236653062613534343636636431386536623164 May 16 00:29:05.250892 env[1215]: time="2025-05-16T00:29:05.250805860Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7c751acbcd1525da2f1a64e395f86bdd,Namespace:kube-system,Attempt:0,} returns sandbox id \"176079e0dbf15fd0776c9558ce86c58692dda2b99ddec63a76e78e42f07f0d69\"" May 16 00:29:05.251947 kubelet[1624]: E0516 00:29:05.251917 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:05.253900 env[1215]: time="2025-05-16T00:29:05.253866100Z" level=info msg="CreateContainer within sandbox \"176079e0dbf15fd0776c9558ce86c58692dda2b99ddec63a76e78e42f07f0d69\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 16 00:29:05.265229 env[1215]: time="2025-05-16T00:29:05.265190340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:447e79232307504a6964f3be51e3d64d,Namespace:kube-system,Attempt:0,} returns sandbox id \"3cd3d1b44b6e0ba54466cd18e6b1d0c534291df413adc023db50bb056222cc25\"" May 16 00:29:05.266003 kubelet[1624]: E0516 00:29:05.265975 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:05.266344 env[1215]: time="2025-05-16T00:29:05.266161540Z" level=info msg="CreateContainer within sandbox \"176079e0dbf15fd0776c9558ce86c58692dda2b99ddec63a76e78e42f07f0d69\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"92d9edd7aa3a96e92b4f09d768ced8c3e3022f186495404582c3e3a82156d71e\"" May 16 00:29:05.267186 env[1215]: time="2025-05-16T00:29:05.267146340Z" level=info msg="StartContainer for \"92d9edd7aa3a96e92b4f09d768ced8c3e3022f186495404582c3e3a82156d71e\"" May 16 00:29:05.267548 env[1215]: time="2025-05-16T00:29:05.267512820Z" level=info msg="CreateContainer within sandbox \"3cd3d1b44b6e0ba54466cd18e6b1d0c534291df413adc023db50bb056222cc25\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 16 00:29:05.269039 env[1215]: time="2025-05-16T00:29:05.269005780Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:3a43cdafcbc42cdd2a3963bea1834cd6,Namespace:kube-system,Attempt:0,} returns sandbox id \"5fbb79c55dddb7d3c3c3d1c12fd0dc0975962aed157ad898a94d9278c03d4540\"" May 16 00:29:05.270115 kubelet[1624]: E0516 00:29:05.270084 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:05.271790 env[1215]: time="2025-05-16T00:29:05.271756220Z" level=info msg="CreateContainer within sandbox \"5fbb79c55dddb7d3c3c3d1c12fd0dc0975962aed157ad898a94d9278c03d4540\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 16 00:29:05.283769 env[1215]: time="2025-05-16T00:29:05.283711860Z" level=info msg="CreateContainer within sandbox \"3cd3d1b44b6e0ba54466cd18e6b1d0c534291df413adc023db50bb056222cc25\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"fb8f452f6972490fb8206fcf3ad97960334f959bda198925e9db091e4a739ea4\"" May 16 00:29:05.284268 env[1215]: time="2025-05-16T00:29:05.284230900Z" level=info msg="StartContainer for \"fb8f452f6972490fb8206fcf3ad97960334f959bda198925e9db091e4a739ea4\"" May 16 00:29:05.286509 systemd[1]: Started cri-containerd-92d9edd7aa3a96e92b4f09d768ced8c3e3022f186495404582c3e3a82156d71e.scope. May 16 00:29:05.288285 env[1215]: time="2025-05-16T00:29:05.288226900Z" level=info msg="CreateContainer within sandbox \"5fbb79c55dddb7d3c3c3d1c12fd0dc0975962aed157ad898a94d9278c03d4540\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"890b0e7288d9e60a32c7afc403ffa3c74710eb4f12e840bf8ad2efde9b5e82df\"" May 16 00:29:05.289583 env[1215]: time="2025-05-16T00:29:05.289552700Z" level=info msg="StartContainer for \"890b0e7288d9e60a32c7afc403ffa3c74710eb4f12e840bf8ad2efde9b5e82df\"" May 16 00:29:05.310050 systemd[1]: Started cri-containerd-890b0e7288d9e60a32c7afc403ffa3c74710eb4f12e840bf8ad2efde9b5e82df.scope. May 16 00:29:05.314669 systemd[1]: Started cri-containerd-fb8f452f6972490fb8206fcf3ad97960334f959bda198925e9db091e4a739ea4.scope. May 16 00:29:05.319153 kubelet[1624]: W0516 00:29:05.319107 1624 reflector.go:569] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.9:6443: connect: connection refused May 16 00:29:05.319294 kubelet[1624]: E0516 00:29:05.319159 1624 reflector.go:166] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.9:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.9:6443: connect: connection refused" logger="UnhandledError" May 16 00:29:05.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.337000 audit: BPF prog-id=67 op=LOAD May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1685 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932643965646437616133613936653932623466303964373638636564 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1685 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932643965646437616133613936653932623466303964373638636564 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit: BPF prog-id=68 op=LOAD May 16 00:29:05.338000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1685 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932643965646437616133613936653932623466303964373638636564 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit: BPF prog-id=69 op=LOAD May 16 00:29:05.338000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1685 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932643965646437616133613936653932623466303964373638636564 May 16 00:29:05.338000 audit: BPF prog-id=69 op=UNLOAD May 16 00:29:05.338000 audit: BPF prog-id=68 op=UNLOAD May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { perfmon } for pid=1798 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit: BPF prog-id=70 op=LOAD May 16 00:29:05.338000 audit[1798]: AVC avc: denied { bpf } for pid=1798 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.338000 audit: BPF prog-id=71 op=LOAD May 16 00:29:05.338000 audit[1798]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1685 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932643965646437616133613936653932623466303964373638636564 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1684 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386634353266363937323439306662383230366663663361643937 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1684 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386634353266363937323439306662383230366663663361643937 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit: BPF prog-id=72 op=LOAD May 16 00:29:05.339000 audit[1820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1684 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386634353266363937323439306662383230366663663361643937 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit: BPF prog-id=73 op=LOAD May 16 00:29:05.339000 audit[1820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1684 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386634353266363937323439306662383230366663663361643937 May 16 00:29:05.339000 audit: BPF prog-id=73 op=UNLOAD May 16 00:29:05.339000 audit: BPF prog-id=72 op=UNLOAD May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { perfmon } for pid=1820 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit[1820]: AVC avc: denied { bpf } for pid=1820 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.339000 audit: BPF prog-id=74 op=LOAD May 16 00:29:05.339000 audit[1820]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1684 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662386634353266363937323439306662383230366663663361643937 May 16 00:29:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.344000 audit: BPF prog-id=75 op=LOAD May 16 00:29:05.345000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1686 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839306230653732383864396536306133326337616663343033666661 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1686 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839306230653732383864396536306133326337616663343033666661 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.345000 audit: BPF prog-id=76 op=LOAD May 16 00:29:05.345000 audit[1831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1686 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839306230653732383864396536306133326337616663343033666661 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit: BPF prog-id=77 op=LOAD May 16 00:29:05.347000 audit[1831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1686 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839306230653732383864396536306133326337616663343033666661 May 16 00:29:05.347000 audit: BPF prog-id=77 op=UNLOAD May 16 00:29:05.347000 audit: BPF prog-id=76 op=UNLOAD May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { perfmon } for pid=1831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit[1831]: AVC avc: denied { bpf } for pid=1831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:05.347000 audit: BPF prog-id=78 op=LOAD May 16 00:29:05.347000 audit[1831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1686 pid=1831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:05.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839306230653732383864396536306133326337616663343033666661 May 16 00:29:05.368070 env[1215]: time="2025-05-16T00:29:05.368023620Z" level=info msg="StartContainer for \"fb8f452f6972490fb8206fcf3ad97960334f959bda198925e9db091e4a739ea4\" returns successfully" May 16 00:29:05.378336 env[1215]: time="2025-05-16T00:29:05.378288700Z" level=info msg="StartContainer for \"92d9edd7aa3a96e92b4f09d768ced8c3e3022f186495404582c3e3a82156d71e\" returns successfully" May 16 00:29:05.391716 env[1215]: time="2025-05-16T00:29:05.391625740Z" level=info msg="StartContainer for \"890b0e7288d9e60a32c7afc403ffa3c74710eb4f12e840bf8ad2efde9b5e82df\" returns successfully" May 16 00:29:05.443371 kubelet[1624]: I0516 00:29:05.440537 1624 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:29:05.443371 kubelet[1624]: E0516 00:29:05.440912 1624 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.9:6443/api/v1/nodes\": dial tcp 10.0.0.9:6443: connect: connection refused" node="localhost" May 16 00:29:05.816157 kubelet[1624]: E0516 00:29:05.816058 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:05.816268 kubelet[1624]: E0516 00:29:05.816200 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:05.817344 kubelet[1624]: E0516 00:29:05.817324 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:05.817475 kubelet[1624]: E0516 00:29:05.817455 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:05.818606 kubelet[1624]: E0516 00:29:05.818583 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:05.818691 kubelet[1624]: E0516 00:29:05.818679 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:06.820657 kubelet[1624]: E0516 00:29:06.820619 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:06.821064 kubelet[1624]: E0516 00:29:06.820743 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:06.821064 kubelet[1624]: E0516 00:29:06.820935 1624 kubelet.go:3190] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:29:06.821064 kubelet[1624]: E0516 00:29:06.821005 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:07.042595 kubelet[1624]: I0516 00:29:07.042562 1624 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:29:07.270000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.270000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003f6120 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:07.270000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:07.270000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7310 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.270000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=40006ae0c0 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:07.270000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:07.337000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.337000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=400459dbe0 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:29:07.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:29:07.337000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7310 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.337000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3f a1=4006d84000 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:29:07.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:29:07.343000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.343000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4006555590 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:29:07.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:29:07.349000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.349000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4003941c40 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:29:07.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:29:07.350000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7310 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.350000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7f a1=4006e939b0 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:29:07.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:29:07.361000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7312 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:07.361000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=4006e93d70 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:29:07.361000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:29:07.442080 kubelet[1624]: I0516 00:29:07.442042 1624 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 16 00:29:07.442080 kubelet[1624]: E0516 00:29:07.442076 1624 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 16 00:29:07.492225 kubelet[1624]: I0516 00:29:07.492144 1624 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 16 00:29:07.508149 kubelet[1624]: E0516 00:29:07.508109 1624 controller.go:145] "Failed to ensure lease exists, will retry" err="namespaces \"kube-node-lease\" not found" interval="3.2s" May 16 00:29:07.602738 kubelet[1624]: E0516 00:29:07.602696 1624 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 16 00:29:07.602738 kubelet[1624]: I0516 00:29:07.602728 1624 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 16 00:29:07.604348 kubelet[1624]: E0516 00:29:07.604327 1624 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 16 00:29:07.604348 kubelet[1624]: I0516 00:29:07.604348 1624 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 16 00:29:07.605952 kubelet[1624]: E0516 00:29:07.605926 1624 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 16 00:29:07.757343 kubelet[1624]: I0516 00:29:07.757297 1624 apiserver.go:52] "Watching apiserver" May 16 00:29:07.790083 kubelet[1624]: I0516 00:29:07.790034 1624 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 16 00:29:07.917639 kubelet[1624]: I0516 00:29:07.917538 1624 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 16 00:29:07.920124 kubelet[1624]: E0516 00:29:07.920100 1624 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 16 00:29:07.920291 kubelet[1624]: E0516 00:29:07.920276 1624 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:09.503890 systemd[1]: Reloading. May 16 00:29:09.545493 /usr/lib/systemd/system-generators/torcx-generator[1927]: time="2025-05-16T00:29:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:29:09.545522 /usr/lib/systemd/system-generators/torcx-generator[1927]: time="2025-05-16T00:29:09Z" level=info msg="torcx already run" May 16 00:29:09.621631 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:29:09.621649 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:29:09.637104 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:29:09.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.697000 audit: BPF prog-id=79 op=LOAD May 16 00:29:09.697000 audit: BPF prog-id=70 op=UNLOAD May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit: BPF prog-id=80 op=LOAD May 16 00:29:09.698000 audit: BPF prog-id=40 op=UNLOAD May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit: BPF prog-id=81 op=LOAD May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.698000 audit: BPF prog-id=82 op=LOAD May 16 00:29:09.698000 audit: BPF prog-id=41 op=UNLOAD May 16 00:29:09.698000 audit: BPF prog-id=42 op=UNLOAD May 16 00:29:09.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.699000 audit: BPF prog-id=83 op=LOAD May 16 00:29:09.699000 audit: BPF prog-id=43 op=UNLOAD May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit: BPF prog-id=84 op=LOAD May 16 00:29:09.700000 audit: BPF prog-id=55 op=UNLOAD May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.700000 audit: BPF prog-id=85 op=LOAD May 16 00:29:09.700000 audit: BPF prog-id=67 op=UNLOAD May 16 00:29:09.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.701000 audit: BPF prog-id=86 op=LOAD May 16 00:29:09.701000 audit: BPF prog-id=63 op=UNLOAD May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit: BPF prog-id=87 op=LOAD May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit: BPF prog-id=88 op=LOAD May 16 00:29:09.702000 audit: BPF prog-id=44 op=UNLOAD May 16 00:29:09.702000 audit: BPF prog-id=45 op=UNLOAD May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.702000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit: BPF prog-id=89 op=LOAD May 16 00:29:09.703000 audit: BPF prog-id=59 op=UNLOAD May 16 00:29:09.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.703000 audit: BPF prog-id=90 op=LOAD May 16 00:29:09.703000 audit: BPF prog-id=46 op=UNLOAD May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit: BPF prog-id=91 op=LOAD May 16 00:29:09.704000 audit: BPF prog-id=47 op=UNLOAD May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit: BPF prog-id=92 op=LOAD May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.704000 audit: BPF prog-id=93 op=LOAD May 16 00:29:09.704000 audit: BPF prog-id=48 op=UNLOAD May 16 00:29:09.704000 audit: BPF prog-id=49 op=UNLOAD May 16 00:29:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.705000 audit: BPF prog-id=94 op=LOAD May 16 00:29:09.705000 audit: BPF prog-id=50 op=UNLOAD May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit: BPF prog-id=95 op=LOAD May 16 00:29:09.706000 audit: BPF prog-id=51 op=UNLOAD May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit: BPF prog-id=96 op=LOAD May 16 00:29:09.707000 audit: BPF prog-id=75 op=UNLOAD May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit: BPF prog-id=97 op=LOAD May 16 00:29:09.707000 audit: BPF prog-id=52 op=UNLOAD May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit: BPF prog-id=98 op=LOAD May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.707000 audit: BPF prog-id=99 op=LOAD May 16 00:29:09.707000 audit: BPF prog-id=53 op=UNLOAD May 16 00:29:09.707000 audit: BPF prog-id=54 op=UNLOAD May 16 00:29:09.719784 systemd[1]: Stopping kubelet.service... May 16 00:29:09.747552 systemd[1]: kubelet.service: Deactivated successfully. May 16 00:29:09.747754 systemd[1]: Stopped kubelet.service. May 16 00:29:09.747813 systemd[1]: kubelet.service: Consumed 1.126s CPU time. May 16 00:29:09.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:09.749566 systemd[1]: Starting kubelet.service... May 16 00:29:09.842338 systemd[1]: Started kubelet.service. May 16 00:29:09.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:09.877776 kubelet[1969]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:29:09.877776 kubelet[1969]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 16 00:29:09.877776 kubelet[1969]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:29:09.878121 kubelet[1969]: I0516 00:29:09.877856 1969 server.go:215] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 16 00:29:09.884093 kubelet[1969]: I0516 00:29:09.884059 1969 server.go:520] "Kubelet version" kubeletVersion="v1.32.4" May 16 00:29:09.884243 kubelet[1969]: I0516 00:29:09.884230 1969 server.go:522] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 16 00:29:09.884726 kubelet[1969]: I0516 00:29:09.884701 1969 server.go:954] "Client rotation is on, will bootstrap in background" May 16 00:29:09.885928 kubelet[1969]: I0516 00:29:09.885904 1969 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 16 00:29:09.888913 kubelet[1969]: I0516 00:29:09.888872 1969 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 16 00:29:09.891589 kubelet[1969]: E0516 00:29:09.891565 1969 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 16 00:29:09.891589 kubelet[1969]: I0516 00:29:09.891587 1969 server.go:1421] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 16 00:29:09.893917 kubelet[1969]: I0516 00:29:09.893888 1969 server.go:772] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 16 00:29:09.894104 kubelet[1969]: I0516 00:29:09.894069 1969 container_manager_linux.go:268] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 16 00:29:09.894298 kubelet[1969]: I0516 00:29:09.894098 1969 container_manager_linux.go:273] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 16 00:29:09.894379 kubelet[1969]: I0516 00:29:09.894306 1969 topology_manager.go:138] "Creating topology manager with none policy" May 16 00:29:09.894379 kubelet[1969]: I0516 00:29:09.894315 1969 container_manager_linux.go:304] "Creating device plugin manager" May 16 00:29:09.894379 kubelet[1969]: I0516 00:29:09.894355 1969 state_mem.go:36] "Initialized new in-memory state store" May 16 00:29:09.894506 kubelet[1969]: I0516 00:29:09.894493 1969 kubelet.go:446] "Attempting to sync node with API server" May 16 00:29:09.894536 kubelet[1969]: I0516 00:29:09.894509 1969 kubelet.go:341] "Adding static pod path" path="/etc/kubernetes/manifests" May 16 00:29:09.894536 kubelet[1969]: I0516 00:29:09.894524 1969 kubelet.go:352] "Adding apiserver pod source" May 16 00:29:09.894536 kubelet[1969]: I0516 00:29:09.894533 1969 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 16 00:29:09.895455 kubelet[1969]: I0516 00:29:09.895435 1969 kuberuntime_manager.go:269] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 16 00:29:09.895942 kubelet[1969]: I0516 00:29:09.895923 1969 kubelet.go:890] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 16 00:29:09.896633 kubelet[1969]: I0516 00:29:09.896593 1969 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 16 00:29:09.896747 kubelet[1969]: I0516 00:29:09.896734 1969 server.go:1287] "Started kubelet" May 16 00:29:09.896996 kubelet[1969]: I0516 00:29:09.896957 1969 server.go:169] "Starting to listen" address="0.0.0.0" port=10250 May 16 00:29:09.897636 kubelet[1969]: I0516 00:29:09.897593 1969 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 16 00:29:09.897784 kubelet[1969]: I0516 00:29:09.897757 1969 server.go:479] "Adding debug handlers to kubelet server" May 16 00:29:09.897997 kubelet[1969]: I0516 00:29:09.897980 1969 server.go:243] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 16 00:29:09.898000 audit[1969]: AVC avc: denied { mac_admin } for pid=1969 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.898000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:29:09.898000 audit[1969]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400075dc20 a1=400038f710 a2=400075dbf0 a3=25 items=0 ppid=1 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:09.898000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:29:09.898000 audit[1969]: AVC avc: denied { mac_admin } for pid=1969 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.898000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:29:09.898000 audit[1969]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400041dde0 a1=400038f728 a2=400075dcb0 a3=25 items=0 ppid=1 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:09.898000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:29:09.900008 kubelet[1969]: I0516 00:29:09.899397 1969 kubelet.go:1507] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 16 00:29:09.900008 kubelet[1969]: I0516 00:29:09.899432 1969 kubelet.go:1511] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 16 00:29:09.900008 kubelet[1969]: I0516 00:29:09.899465 1969 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 16 00:29:09.900008 kubelet[1969]: I0516 00:29:09.899891 1969 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 16 00:29:09.908201 kubelet[1969]: E0516 00:29:09.908161 1969 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:29:09.908285 kubelet[1969]: I0516 00:29:09.908212 1969 volume_manager.go:297] "Starting Kubelet Volume Manager" May 16 00:29:09.908412 kubelet[1969]: I0516 00:29:09.908392 1969 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 16 00:29:09.908530 kubelet[1969]: I0516 00:29:09.908516 1969 reconciler.go:26] "Reconciler: start to sync state" May 16 00:29:09.918909 kubelet[1969]: E0516 00:29:09.918879 1969 kubelet.go:1555] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 16 00:29:09.919243 kubelet[1969]: I0516 00:29:09.918949 1969 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 16 00:29:09.920335 kubelet[1969]: I0516 00:29:09.920311 1969 factory.go:221] Registration of the containerd container factory successfully May 16 00:29:09.920335 kubelet[1969]: I0516 00:29:09.920331 1969 factory.go:221] Registration of the systemd container factory successfully May 16 00:29:09.923537 kubelet[1969]: I0516 00:29:09.923500 1969 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 16 00:29:09.925832 kubelet[1969]: I0516 00:29:09.925810 1969 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 16 00:29:09.925923 kubelet[1969]: I0516 00:29:09.925912 1969 status_manager.go:227] "Starting to sync pod status with apiserver" May 16 00:29:09.925991 kubelet[1969]: I0516 00:29:09.925977 1969 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 16 00:29:09.926049 kubelet[1969]: I0516 00:29:09.926040 1969 kubelet.go:2382] "Starting kubelet main sync loop" May 16 00:29:09.926139 kubelet[1969]: E0516 00:29:09.926123 1969 kubelet.go:2406] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 16 00:29:09.964558 kubelet[1969]: I0516 00:29:09.964530 1969 cpu_manager.go:221] "Starting CPU manager" policy="none" May 16 00:29:09.964558 kubelet[1969]: I0516 00:29:09.964563 1969 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 16 00:29:09.964721 kubelet[1969]: I0516 00:29:09.964587 1969 state_mem.go:36] "Initialized new in-memory state store" May 16 00:29:09.964767 kubelet[1969]: I0516 00:29:09.964750 1969 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 16 00:29:09.964795 kubelet[1969]: I0516 00:29:09.964767 1969 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 16 00:29:09.964795 kubelet[1969]: I0516 00:29:09.964786 1969 policy_none.go:49] "None policy: Start" May 16 00:29:09.964795 kubelet[1969]: I0516 00:29:09.964795 1969 memory_manager.go:186] "Starting memorymanager" policy="None" May 16 00:29:09.964854 kubelet[1969]: I0516 00:29:09.964806 1969 state_mem.go:35] "Initializing new in-memory state store" May 16 00:29:09.964911 kubelet[1969]: I0516 00:29:09.964901 1969 state_mem.go:75] "Updated machine memory state" May 16 00:29:09.968184 kubelet[1969]: I0516 00:29:09.968142 1969 manager.go:519] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 16 00:29:09.967000 audit[1969]: AVC avc: denied { mac_admin } for pid=1969 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:09.967000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:29:09.967000 audit[1969]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001218300 a1=4001207ce0 a2=40012182d0 a3=25 items=0 ppid=1 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:09.967000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:29:09.968771 kubelet[1969]: I0516 00:29:09.968339 1969 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" May 16 00:29:09.969292 kubelet[1969]: I0516 00:29:09.969275 1969 eviction_manager.go:189] "Eviction manager: starting control loop" May 16 00:29:09.969417 kubelet[1969]: I0516 00:29:09.969380 1969 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 16 00:29:09.969632 kubelet[1969]: I0516 00:29:09.969616 1969 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 16 00:29:09.970874 kubelet[1969]: E0516 00:29:09.970741 1969 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 16 00:29:10.027031 kubelet[1969]: I0516 00:29:10.026981 1969 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 16 00:29:10.027324 kubelet[1969]: I0516 00:29:10.027290 1969 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 16 00:29:10.027460 kubelet[1969]: I0516 00:29:10.027434 1969 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 16 00:29:10.074905 kubelet[1969]: I0516 00:29:10.074300 1969 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:29:10.082660 kubelet[1969]: I0516 00:29:10.082608 1969 kubelet_node_status.go:124] "Node was previously registered" node="localhost" May 16 00:29:10.083101 kubelet[1969]: I0516 00:29:10.082685 1969 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 16 00:29:10.111194 kubelet[1969]: I0516 00:29:10.110143 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:10.111194 kubelet[1969]: I0516 00:29:10.110201 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3a43cdafcbc42cdd2a3963bea1834cd6-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"3a43cdafcbc42cdd2a3963bea1834cd6\") " pod="kube-system/kube-apiserver-localhost" May 16 00:29:10.111194 kubelet[1969]: I0516 00:29:10.110220 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3a43cdafcbc42cdd2a3963bea1834cd6-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"3a43cdafcbc42cdd2a3963bea1834cd6\") " pod="kube-system/kube-apiserver-localhost" May 16 00:29:10.111194 kubelet[1969]: I0516 00:29:10.110234 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:10.111194 kubelet[1969]: I0516 00:29:10.110267 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:10.111442 kubelet[1969]: I0516 00:29:10.110285 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:10.111442 kubelet[1969]: I0516 00:29:10.110301 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/447e79232307504a6964f3be51e3d64d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"447e79232307504a6964f3be51e3d64d\") " pod="kube-system/kube-scheduler-localhost" May 16 00:29:10.111442 kubelet[1969]: I0516 00:29:10.110316 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3a43cdafcbc42cdd2a3963bea1834cd6-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"3a43cdafcbc42cdd2a3963bea1834cd6\") " pod="kube-system/kube-apiserver-localhost" May 16 00:29:10.111442 kubelet[1969]: I0516 00:29:10.110339 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7c751acbcd1525da2f1a64e395f86bdd-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7c751acbcd1525da2f1a64e395f86bdd\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:29:10.334848 kubelet[1969]: E0516 00:29:10.334805 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:10.334970 kubelet[1969]: E0516 00:29:10.334885 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:10.334970 kubelet[1969]: E0516 00:29:10.334959 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:10.895872 kubelet[1969]: I0516 00:29:10.895825 1969 apiserver.go:52] "Watching apiserver" May 16 00:29:10.909052 kubelet[1969]: I0516 00:29:10.909015 1969 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 16 00:29:10.940863 kubelet[1969]: I0516 00:29:10.940833 1969 kubelet.go:3194] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 16 00:29:10.941233 kubelet[1969]: E0516 00:29:10.941197 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:10.941414 kubelet[1969]: E0516 00:29:10.941395 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:10.946127 kubelet[1969]: E0516 00:29:10.946096 1969 kubelet.go:3196] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 16 00:29:10.946299 kubelet[1969]: E0516 00:29:10.946264 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:10.968697 kubelet[1969]: I0516 00:29:10.968640 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=0.968623026 podStartE2EDuration="968.623026ms" podCreationTimestamp="2025-05-16 00:29:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:29:10.968292104 +0000 UTC m=+1.122300845" watchObservedRunningTime="2025-05-16 00:29:10.968623026 +0000 UTC m=+1.122631767" May 16 00:29:10.968851 kubelet[1969]: I0516 00:29:10.968741 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=0.968737107 podStartE2EDuration="968.737107ms" podCreationTimestamp="2025-05-16 00:29:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:29:10.961112898 +0000 UTC m=+1.115121679" watchObservedRunningTime="2025-05-16 00:29:10.968737107 +0000 UTC m=+1.122745808" May 16 00:29:10.976982 kubelet[1969]: I0516 00:29:10.976752 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=0.976736358 podStartE2EDuration="976.736358ms" podCreationTimestamp="2025-05-16 00:29:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:29:10.976589838 +0000 UTC m=+1.130598579" watchObservedRunningTime="2025-05-16 00:29:10.976736358 +0000 UTC m=+1.130745099" May 16 00:29:11.477000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 16 00:29:11.479494 kernel: kauditd_printk_skb: 616 callbacks suppressed May 16 00:29:11.479570 kernel: audit: type=1400 audit(1747355351.477:811): avc: denied { watch } for pid=1840 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7337 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 16 00:29:11.477000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40004ff0c0 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:11.484438 kernel: audit: type=1300 audit(1747355351.477:811): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40004ff0c0 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:11.484490 kernel: audit: type=1327 audit(1747355351.477:811): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:11.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:11.942592 kubelet[1969]: E0516 00:29:11.942551 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:11.942985 kubelet[1969]: E0516 00:29:11.942961 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:13.928000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:13.929000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:13.934462 kernel: audit: type=1400 audit(1747355353.928:812): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:13.934517 kernel: audit: type=1400 audit(1747355353.929:813): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:13.934535 kernel: audit: type=1300 audit(1747355353.929:813): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400125bc20 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:13.929000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400125bc20 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:13.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:13.940284 kernel: audit: type=1327 audit(1747355353.929:813): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:13.940335 kernel: audit: type=1400 audit(1747355353.929:814): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:13.929000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:13.929000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a3d2a0 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:13.945871 kernel: audit: type=1300 audit(1747355353.929:814): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a3d2a0 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:13.945918 kernel: audit: type=1327 audit(1747355353.929:814): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:13.929000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:13.930000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:29:13.930000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e2edc0 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:13.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:13.928000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40000f6320 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:29:13.928000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:29:14.681443 kubelet[1969]: I0516 00:29:14.681413 1969 kuberuntime_manager.go:1702] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 16 00:29:14.682100 env[1215]: time="2025-05-16T00:29:14.682062546Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 16 00:29:14.682509 kubelet[1969]: I0516 00:29:14.682493 1969 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 16 00:29:14.991061 kubelet[1969]: E0516 00:29:14.990969 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:15.048613 systemd[1]: Created slice kubepods-besteffort-pod1a39977d_68e6_49f1_be06_bdcf5c656bdd.slice. May 16 00:29:15.146282 kubelet[1969]: I0516 00:29:15.146228 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/1a39977d-68e6-49f1-be06-bdcf5c656bdd-kube-proxy\") pod \"kube-proxy-8pc6s\" (UID: \"1a39977d-68e6-49f1-be06-bdcf5c656bdd\") " pod="kube-system/kube-proxy-8pc6s" May 16 00:29:15.146282 kubelet[1969]: I0516 00:29:15.146269 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/1a39977d-68e6-49f1-be06-bdcf5c656bdd-xtables-lock\") pod \"kube-proxy-8pc6s\" (UID: \"1a39977d-68e6-49f1-be06-bdcf5c656bdd\") " pod="kube-system/kube-proxy-8pc6s" May 16 00:29:15.146282 kubelet[1969]: I0516 00:29:15.146287 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/1a39977d-68e6-49f1-be06-bdcf5c656bdd-lib-modules\") pod \"kube-proxy-8pc6s\" (UID: \"1a39977d-68e6-49f1-be06-bdcf5c656bdd\") " pod="kube-system/kube-proxy-8pc6s" May 16 00:29:15.146497 kubelet[1969]: I0516 00:29:15.146304 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4fhvs\" (UniqueName: \"kubernetes.io/projected/1a39977d-68e6-49f1-be06-bdcf5c656bdd-kube-api-access-4fhvs\") pod \"kube-proxy-8pc6s\" (UID: \"1a39977d-68e6-49f1-be06-bdcf5c656bdd\") " pod="kube-system/kube-proxy-8pc6s" May 16 00:29:15.256341 kubelet[1969]: E0516 00:29:15.256231 1969 projected.go:288] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 16 00:29:15.256341 kubelet[1969]: E0516 00:29:15.256267 1969 projected.go:194] Error preparing data for projected volume kube-api-access-4fhvs for pod kube-system/kube-proxy-8pc6s: configmap "kube-root-ca.crt" not found May 16 00:29:15.256341 kubelet[1969]: E0516 00:29:15.256326 1969 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/1a39977d-68e6-49f1-be06-bdcf5c656bdd-kube-api-access-4fhvs podName:1a39977d-68e6-49f1-be06-bdcf5c656bdd nodeName:}" failed. No retries permitted until 2025-05-16 00:29:15.756305556 +0000 UTC m=+5.910314297 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-4fhvs" (UniqueName: "kubernetes.io/projected/1a39977d-68e6-49f1-be06-bdcf5c656bdd-kube-api-access-4fhvs") pod "kube-proxy-8pc6s" (UID: "1a39977d-68e6-49f1-be06-bdcf5c656bdd") : configmap "kube-root-ca.crt" not found May 16 00:29:15.817725 systemd[1]: Created slice kubepods-besteffort-podf471cbc7_1d80_4988_8249_8f41e51d1172.slice. May 16 00:29:15.851297 kubelet[1969]: I0516 00:29:15.851244 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f471cbc7-1d80-4988-8249-8f41e51d1172-var-lib-calico\") pod \"tigera-operator-844669ff44-xfk67\" (UID: \"f471cbc7-1d80-4988-8249-8f41e51d1172\") " pod="tigera-operator/tigera-operator-844669ff44-xfk67" May 16 00:29:15.851297 kubelet[1969]: I0516 00:29:15.851297 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-26ndh\" (UniqueName: \"kubernetes.io/projected/f471cbc7-1d80-4988-8249-8f41e51d1172-kube-api-access-26ndh\") pod \"tigera-operator-844669ff44-xfk67\" (UID: \"f471cbc7-1d80-4988-8249-8f41e51d1172\") " pod="tigera-operator/tigera-operator-844669ff44-xfk67" May 16 00:29:15.851780 kubelet[1969]: I0516 00:29:15.851741 1969 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 16 00:29:15.958038 kubelet[1969]: E0516 00:29:15.957995 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:15.958573 env[1215]: time="2025-05-16T00:29:15.958528422Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8pc6s,Uid:1a39977d-68e6-49f1-be06-bdcf5c656bdd,Namespace:kube-system,Attempt:0,}" May 16 00:29:15.980207 env[1215]: time="2025-05-16T00:29:15.980119442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:15.980304 env[1215]: time="2025-05-16T00:29:15.980219163Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:15.980304 env[1215]: time="2025-05-16T00:29:15.980246563Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:15.980510 env[1215]: time="2025-05-16T00:29:15.980456444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ca2441181bd9f2779bdfc71ae0f12508bf248b38fe8cd66bf8883d26af82f34b pid=2030 runtime=io.containerd.runc.v2 May 16 00:29:15.993317 systemd[1]: Started cri-containerd-ca2441181bd9f2779bdfc71ae0f12508bf248b38fe8cd66bf8883d26af82f34b.scope. May 16 00:29:16.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit: BPF prog-id=100 op=LOAD May 16 00:29:16.016000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.016000 audit[2040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2030 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323434313138316264396632373739626466633731616530663132 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2030 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323434313138316264396632373739626466633731616530663132 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit: BPF prog-id=101 op=LOAD May 16 00:29:16.017000 audit[2040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2030 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323434313138316264396632373739626466633731616530663132 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit: BPF prog-id=102 op=LOAD May 16 00:29:16.017000 audit[2040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2030 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323434313138316264396632373739626466633731616530663132 May 16 00:29:16.017000 audit: BPF prog-id=102 op=UNLOAD May 16 00:29:16.017000 audit: BPF prog-id=101 op=UNLOAD May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { perfmon } for pid=2040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit[2040]: AVC avc: denied { bpf } for pid=2040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.017000 audit: BPF prog-id=103 op=LOAD May 16 00:29:16.017000 audit[2040]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2030 pid=2040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361323434313138316264396632373739626466633731616530663132 May 16 00:29:16.029877 env[1215]: time="2025-05-16T00:29:16.029831865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-8pc6s,Uid:1a39977d-68e6-49f1-be06-bdcf5c656bdd,Namespace:kube-system,Attempt:0,} returns sandbox id \"ca2441181bd9f2779bdfc71ae0f12508bf248b38fe8cd66bf8883d26af82f34b\"" May 16 00:29:16.030582 kubelet[1969]: E0516 00:29:16.030561 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:16.033858 env[1215]: time="2025-05-16T00:29:16.033793483Z" level=info msg="CreateContainer within sandbox \"ca2441181bd9f2779bdfc71ae0f12508bf248b38fe8cd66bf8883d26af82f34b\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 16 00:29:16.046527 env[1215]: time="2025-05-16T00:29:16.046473218Z" level=info msg="CreateContainer within sandbox \"ca2441181bd9f2779bdfc71ae0f12508bf248b38fe8cd66bf8883d26af82f34b\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"684446ebe4dd23757ec55f508ff948b197bee97953cf29098b3a68b93c9dfefc\"" May 16 00:29:16.047083 env[1215]: time="2025-05-16T00:29:16.047037500Z" level=info msg="StartContainer for \"684446ebe4dd23757ec55f508ff948b197bee97953cf29098b3a68b93c9dfefc\"" May 16 00:29:16.061819 systemd[1]: Started cri-containerd-684446ebe4dd23757ec55f508ff948b197bee97953cf29098b3a68b93c9dfefc.scope. May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2030 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343434366562653464643233373537656335356635303866663934 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit: BPF prog-id=104 op=LOAD May 16 00:29:16.082000 audit[2071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2030 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343434366562653464643233373537656335356635303866663934 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.082000 audit: BPF prog-id=105 op=LOAD May 16 00:29:16.082000 audit[2071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2030 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343434366562653464643233373537656335356635303866663934 May 16 00:29:16.084000 audit: BPF prog-id=105 op=UNLOAD May 16 00:29:16.084000 audit: BPF prog-id=104 op=UNLOAD May 16 00:29:16.084000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { perfmon } for pid=2071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit[2071]: AVC avc: denied { bpf } for pid=2071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.084000 audit: BPF prog-id=106 op=LOAD May 16 00:29:16.084000 audit[2071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2030 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638343434366562653464643233373537656335356635303866663934 May 16 00:29:16.100639 env[1215]: time="2025-05-16T00:29:16.099851451Z" level=info msg="StartContainer for \"684446ebe4dd23757ec55f508ff948b197bee97953cf29098b3a68b93c9dfefc\" returns successfully" May 16 00:29:16.121468 env[1215]: time="2025-05-16T00:29:16.120526381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-xfk67,Uid:f471cbc7-1d80-4988-8249-8f41e51d1172,Namespace:tigera-operator,Attempt:0,}" May 16 00:29:16.134079 env[1215]: time="2025-05-16T00:29:16.133997200Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:16.134079 env[1215]: time="2025-05-16T00:29:16.134039600Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:16.134079 env[1215]: time="2025-05-16T00:29:16.134051440Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:16.134311 env[1215]: time="2025-05-16T00:29:16.134265561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/82c128d14d8669266d3d36e28edcb4bdf17325c71ce46a341d5d4eb7c99b0f09 pid=2107 runtime=io.containerd.runc.v2 May 16 00:29:16.144834 systemd[1]: Started cri-containerd-82c128d14d8669266d3d36e28edcb4bdf17325c71ce46a341d5d4eb7c99b0f09.scope. May 16 00:29:16.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit: BPF prog-id=107 op=LOAD May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633132386431346438363639323636643364333665323865646362 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633132386431346438363639323636643364333665323865646362 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit: BPF prog-id=108 op=LOAD May 16 00:29:16.164000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633132386431346438363639323636643364333665323865646362 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit: BPF prog-id=109 op=LOAD May 16 00:29:16.164000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633132386431346438363639323636643364333665323865646362 May 16 00:29:16.164000 audit: BPF prog-id=109 op=UNLOAD May 16 00:29:16.164000 audit: BPF prog-id=108 op=UNLOAD May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { perfmon } for pid=2117 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit[2117]: AVC avc: denied { bpf } for pid=2117 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:16.164000 audit: BPF prog-id=110 op=LOAD May 16 00:29:16.164000 audit[2117]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2107 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832633132386431346438363639323636643364333665323865646362 May 16 00:29:16.188695 env[1215]: time="2025-05-16T00:29:16.182681412Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-xfk67,Uid:f471cbc7-1d80-4988-8249-8f41e51d1172,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"82c128d14d8669266d3d36e28edcb4bdf17325c71ce46a341d5d4eb7c99b0f09\"" May 16 00:29:16.188695 env[1215]: time="2025-05-16T00:29:16.184426619Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 16 00:29:16.245807 kubelet[1969]: E0516 00:29:16.245483 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:16.304000 audit[2172]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.304000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde758c40 a2=0 a3=1 items=0 ppid=2082 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 16 00:29:16.305000 audit[2174]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2174 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.305000 audit[2174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffee462ec0 a2=0 a3=1 items=0 ppid=2082 pid=2174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 16 00:29:16.306000 audit[2175]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.306000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff2b30580 a2=0 a3=1 items=0 ppid=2082 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 16 00:29:16.307000 audit[2176]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2176 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.307000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee59d320 a2=0 a3=1 items=0 ppid=2082 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.307000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 16 00:29:16.307000 audit[2177]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.307000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc96c6230 a2=0 a3=1 items=0 ppid=2082 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.307000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 16 00:29:16.308000 audit[2178]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.308000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffda6f6b20 a2=0 a3=1 items=0 ppid=2082 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.308000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 16 00:29:16.406000 audit[2179]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.406000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffddb9bbd0 a2=0 a3=1 items=0 ppid=2082 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 16 00:29:16.411000 audit[2181]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.411000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeb677210 a2=0 a3=1 items=0 ppid=2082 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 16 00:29:16.419000 audit[2184]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.419000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffddc01e30 a2=0 a3=1 items=0 ppid=2082 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 16 00:29:16.420000 audit[2185]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.420000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffffae3560 a2=0 a3=1 items=0 ppid=2082 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 16 00:29:16.422000 audit[2187]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.422000 audit[2187]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe2152500 a2=0 a3=1 items=0 ppid=2082 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 16 00:29:16.423000 audit[2188]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.423000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1c9e550 a2=0 a3=1 items=0 ppid=2082 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 16 00:29:16.426000 audit[2190]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.426000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd14ca990 a2=0 a3=1 items=0 ppid=2082 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 16 00:29:16.429000 audit[2193]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.429000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff8a001d0 a2=0 a3=1 items=0 ppid=2082 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 16 00:29:16.430000 audit[2194]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.430000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd8fef7c0 a2=0 a3=1 items=0 ppid=2082 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.430000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 16 00:29:16.432000 audit[2196]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.432000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcdcef4d0 a2=0 a3=1 items=0 ppid=2082 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.432000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 16 00:29:16.433000 audit[2197]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.433000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe04a48f0 a2=0 a3=1 items=0 ppid=2082 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 16 00:29:16.435000 audit[2199]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.435000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc3473a30 a2=0 a3=1 items=0 ppid=2082 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:29:16.439000 audit[2202]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.439000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeaeb3c90 a2=0 a3=1 items=0 ppid=2082 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:29:16.443000 audit[2205]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.443000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff67c0210 a2=0 a3=1 items=0 ppid=2082 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.443000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 16 00:29:16.444000 audit[2206]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.444000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd6ddec00 a2=0 a3=1 items=0 ppid=2082 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.444000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 16 00:29:16.446000 audit[2208]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.446000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdeec2960 a2=0 a3=1 items=0 ppid=2082 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:29:16.450000 audit[2211]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.450000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffde55a700 a2=0 a3=1 items=0 ppid=2082 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:29:16.451000 audit[2212]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.451000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee099640 a2=0 a3=1 items=0 ppid=2082 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 16 00:29:16.453000 audit[2214]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:29:16.453000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffc5254950 a2=0 a3=1 items=0 ppid=2082 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.453000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 16 00:29:16.476000 audit[2220]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:16.476000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffcc15bc40 a2=0 a3=1 items=0 ppid=2082 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.476000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:16.487000 audit[2220]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:16.489264 kernel: kauditd_printk_skb: 240 callbacks suppressed May 16 00:29:16.489307 kernel: audit: type=1325 audit(1747355356.487:884): table=nat:64 family=2 entries=14 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:16.487000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffcc15bc40 a2=0 a3=1 items=0 ppid=2082 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.493336 kernel: audit: type=1300 audit(1747355356.487:884): arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffcc15bc40 a2=0 a3=1 items=0 ppid=2082 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.493406 kernel: audit: type=1327 audit(1747355356.487:884): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:16.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:16.494669 kernel: audit: type=1325 audit(1747355356.488:885): table=filter:65 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.488000 audit[2225]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.488000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffcded480 a2=0 a3=1 items=0 ppid=2082 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.498836 kernel: audit: type=1300 audit(1747355356.488:885): arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffffcded480 a2=0 a3=1 items=0 ppid=2082 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.498930 kernel: audit: type=1327 audit(1747355356.488:885): proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 16 00:29:16.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 16 00:29:16.500286 kernel: audit: type=1325 audit(1747355356.491:886): table=filter:66 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.491000 audit[2227]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.491000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5acd820 a2=0 a3=1 items=0 ppid=2082 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.504420 kernel: audit: type=1300 audit(1747355356.491:886): arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd5acd820 a2=0 a3=1 items=0 ppid=2082 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.504475 kernel: audit: type=1327 audit(1747355356.491:886): proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 16 00:29:16.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 16 00:29:16.495000 audit[2230]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.508274 kernel: audit: type=1325 audit(1747355356.495:887): table=filter:67 family=10 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.495000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff9962f40 a2=0 a3=1 items=0 ppid=2082 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 16 00:29:16.496000 audit[2231]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.496000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc9cd4fb0 a2=0 a3=1 items=0 ppid=2082 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 16 00:29:16.498000 audit[2233]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.498000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff095f350 a2=0 a3=1 items=0 ppid=2082 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.498000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 16 00:29:16.499000 audit[2234]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.499000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcff985e0 a2=0 a3=1 items=0 ppid=2082 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 16 00:29:16.501000 audit[2236]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.501000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff569c850 a2=0 a3=1 items=0 ppid=2082 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.501000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 16 00:29:16.505000 audit[2239]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.505000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffc5958e60 a2=0 a3=1 items=0 ppid=2082 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 16 00:29:16.506000 audit[2240]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.506000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff89d2050 a2=0 a3=1 items=0 ppid=2082 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 16 00:29:16.509000 audit[2242]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.509000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa0f6ff0 a2=0 a3=1 items=0 ppid=2082 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 16 00:29:16.510000 audit[2243]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.510000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef81c630 a2=0 a3=1 items=0 ppid=2082 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 16 00:29:16.513000 audit[2245]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.513000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5aa53b0 a2=0 a3=1 items=0 ppid=2082 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:29:16.516000 audit[2248]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.516000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffe1c2d20 a2=0 a3=1 items=0 ppid=2082 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 16 00:29:16.520000 audit[2251]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.520000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee878a60 a2=0 a3=1 items=0 ppid=2082 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 16 00:29:16.521000 audit[2252]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.521000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd36d5150 a2=0 a3=1 items=0 ppid=2082 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 16 00:29:16.524000 audit[2254]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.524000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc86cb7d0 a2=0 a3=1 items=0 ppid=2082 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:29:16.527000 audit[2257]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.527000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe7d4b7a0 a2=0 a3=1 items=0 ppid=2082 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:29:16.528000 audit[2258]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.528000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc120e600 a2=0 a3=1 items=0 ppid=2082 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 16 00:29:16.530000 audit[2260]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.530000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffda080e30 a2=0 a3=1 items=0 ppid=2082 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 16 00:29:16.531000 audit[2261]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.531000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc8f1f10 a2=0 a3=1 items=0 ppid=2082 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 16 00:29:16.533000 audit[2263]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.533000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc33be090 a2=0 a3=1 items=0 ppid=2082 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:29:16.537000 audit[2266]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:29:16.537000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffc7583b0 a2=0 a3=1 items=0 ppid=2082 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.537000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:29:16.540000 audit[2268]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 16 00:29:16.540000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffe2828060 a2=0 a3=1 items=0 ppid=2082 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.540000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:16.540000 audit[2268]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 16 00:29:16.540000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffe2828060 a2=0 a3=1 items=0 ppid=2082 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:16.540000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:16.953012 kubelet[1969]: E0516 00:29:16.952960 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:16.953547 kubelet[1969]: E0516 00:29:16.953521 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:16.963565 kubelet[1969]: I0516 00:29:16.963411 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-8pc6s" podStartSLOduration=1.963394936 podStartE2EDuration="1.963394936s" podCreationTimestamp="2025-05-16 00:29:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:29:16.963149375 +0000 UTC m=+7.117158116" watchObservedRunningTime="2025-05-16 00:29:16.963394936 +0000 UTC m=+7.117403677" May 16 00:29:17.216678 kubelet[1969]: E0516 00:29:17.216550 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:17.646797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1641233178.mount: Deactivated successfully. May 16 00:29:17.955105 kubelet[1969]: E0516 00:29:17.954708 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:17.955105 kubelet[1969]: E0516 00:29:17.954784 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:18.846118 env[1215]: time="2025-05-16T00:29:18.846076147Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:18.847920 env[1215]: time="2025-05-16T00:29:18.847891194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:18.850240 env[1215]: time="2025-05-16T00:29:18.850213763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:18.852574 env[1215]: time="2025-05-16T00:29:18.852501011Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:18.853386 env[1215]: time="2025-05-16T00:29:18.853346855Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b\"" May 16 00:29:18.856672 env[1215]: time="2025-05-16T00:29:18.856624667Z" level=info msg="CreateContainer within sandbox \"82c128d14d8669266d3d36e28edcb4bdf17325c71ce46a341d5d4eb7c99b0f09\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 16 00:29:18.865497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount392205368.mount: Deactivated successfully. May 16 00:29:18.869200 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2005698675.mount: Deactivated successfully. May 16 00:29:18.871192 env[1215]: time="2025-05-16T00:29:18.871140283Z" level=info msg="CreateContainer within sandbox \"82c128d14d8669266d3d36e28edcb4bdf17325c71ce46a341d5d4eb7c99b0f09\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"f4593ae70840cfb27e41b147ec594a6837f6a7a7539c082f439078a14331d925\"" May 16 00:29:18.872035 env[1215]: time="2025-05-16T00:29:18.871949166Z" level=info msg="StartContainer for \"f4593ae70840cfb27e41b147ec594a6837f6a7a7539c082f439078a14331d925\"" May 16 00:29:18.891793 systemd[1]: Started cri-containerd-f4593ae70840cfb27e41b147ec594a6837f6a7a7539c082f439078a14331d925.scope. May 16 00:29:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit: BPF prog-id=111 op=LOAD May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2107 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:18.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634353933616537303834306366623237653431623134376563353934 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2107 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:18.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634353933616537303834306366623237653431623134376563353934 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit: BPF prog-id=112 op=LOAD May 16 00:29:18.918000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2107 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:18.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634353933616537303834306366623237653431623134376563353934 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.918000 audit: BPF prog-id=113 op=LOAD May 16 00:29:18.918000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2107 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:18.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634353933616537303834306366623237653431623134376563353934 May 16 00:29:18.918000 audit: BPF prog-id=113 op=UNLOAD May 16 00:29:18.919000 audit: BPF prog-id=112 op=UNLOAD May 16 00:29:18.919000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { perfmon } for pid=2277 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit[2277]: AVC avc: denied { bpf } for pid=2277 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:18.919000 audit: BPF prog-id=114 op=LOAD May 16 00:29:18.919000 audit[2277]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2107 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:18.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6634353933616537303834306366623237653431623134376563353934 May 16 00:29:18.935059 env[1215]: time="2025-05-16T00:29:18.934968287Z" level=info msg="StartContainer for \"f4593ae70840cfb27e41b147ec594a6837f6a7a7539c082f439078a14331d925\" returns successfully" May 16 00:29:22.445390 update_engine[1207]: I0516 00:29:22.445320 1207 update_attempter.cc:509] Updating boot flags... May 16 00:29:24.425644 sudo[1356]: pam_unix(sudo:session): session closed for user root May 16 00:29:24.424000 audit[1356]: USER_END pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:29:24.426594 kernel: kauditd_printk_skb: 122 callbacks suppressed May 16 00:29:24.426669 kernel: audit: type=1106 audit(1747355364.424:927): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:29:24.425000 audit[1356]: CRED_DISP pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:29:24.431575 kernel: audit: type=1104 audit(1747355364.425:928): pid=1356 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:29:24.431669 sshd[1352]: pam_unix(sshd:session): session closed for user core May 16 00:29:24.431000 audit[1352]: USER_END pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:24.434204 systemd[1]: sshd@6-10.0.0.9:22-10.0.0.1:56124.service: Deactivated successfully. May 16 00:29:24.431000 audit[1352]: CRED_DISP pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:24.436660 systemd[1]: session-7.scope: Deactivated successfully. May 16 00:29:24.436811 systemd[1]: session-7.scope: Consumed 7.327s CPU time. May 16 00:29:24.437276 systemd-logind[1202]: Session 7 logged out. Waiting for processes to exit. May 16 00:29:24.438380 systemd-logind[1202]: Removed session 7. May 16 00:29:24.438760 kernel: audit: type=1106 audit(1747355364.431:929): pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:24.438811 kernel: audit: type=1104 audit(1747355364.431:930): pid=1352 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:24.438832 kernel: audit: type=1131 audit(1747355364.433:931): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.9:22-10.0.0.1:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:24.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.9:22-10.0.0.1:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:25.005117 kubelet[1969]: E0516 00:29:25.005085 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:25.024625 kubelet[1969]: I0516 00:29:25.024560 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-xfk67" podStartSLOduration=7.354219054 podStartE2EDuration="10.024545415s" podCreationTimestamp="2025-05-16 00:29:15 +0000 UTC" firstStartedPulling="2025-05-16 00:29:16.183941297 +0000 UTC m=+6.337950038" lastFinishedPulling="2025-05-16 00:29:18.854267658 +0000 UTC m=+9.008276399" observedRunningTime="2025-05-16 00:29:18.969778181 +0000 UTC m=+9.123786922" watchObservedRunningTime="2025-05-16 00:29:25.024545415 +0000 UTC m=+15.178554156" May 16 00:29:25.043000 audit[2376]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:25.043000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffd79f940 a2=0 a3=1 items=0 ppid=2082 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:25.049548 kernel: audit: type=1325 audit(1747355365.043:932): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:25.049599 kernel: audit: type=1300 audit(1747355365.043:932): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=fffffd79f940 a2=0 a3=1 items=0 ppid=2082 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:25.049626 kernel: audit: type=1327 audit(1747355365.043:932): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:25.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:25.051000 audit[2376]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:25.051000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffd79f940 a2=0 a3=1 items=0 ppid=2082 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:25.057669 kernel: audit: type=1325 audit(1747355365.051:933): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:25.057742 kernel: audit: type=1300 audit(1747355365.051:933): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffd79f940 a2=0 a3=1 items=0 ppid=2082 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:25.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:25.077000 audit[2378]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:25.077000 audit[2378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc6917db0 a2=0 a3=1 items=0 ppid=2082 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:25.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:25.084000 audit[2378]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2378 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:25.084000 audit[2378]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc6917db0 a2=0 a3=1 items=0 ppid=2082 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:25.084000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:25.969022 kubelet[1969]: E0516 00:29:25.968969 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:27.407000 audit[2380]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:27.407000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffea564bd0 a2=0 a3=1 items=0 ppid=2082 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:27.407000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:27.413000 audit[2380]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:27.413000 audit[2380]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffea564bd0 a2=0 a3=1 items=0 ppid=2082 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:27.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:27.433000 audit[2382]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:27.433000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffeb3637b0 a2=0 a3=1 items=0 ppid=2082 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:27.433000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:27.439000 audit[2382]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:27.439000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffeb3637b0 a2=0 a3=1 items=0 ppid=2082 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:27.439000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:27.756590 systemd[1]: Created slice kubepods-besteffort-pod36eff84d_3803_4eb4_84f8_c35a9b585290.slice. May 16 00:29:27.833203 kubelet[1969]: I0516 00:29:27.833141 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/36eff84d-3803-4eb4-84f8-c35a9b585290-tigera-ca-bundle\") pod \"calico-typha-866bc6bf75-5ljd6\" (UID: \"36eff84d-3803-4eb4-84f8-c35a9b585290\") " pod="calico-system/calico-typha-866bc6bf75-5ljd6" May 16 00:29:27.833203 kubelet[1969]: I0516 00:29:27.833197 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/36eff84d-3803-4eb4-84f8-c35a9b585290-typha-certs\") pod \"calico-typha-866bc6bf75-5ljd6\" (UID: \"36eff84d-3803-4eb4-84f8-c35a9b585290\") " pod="calico-system/calico-typha-866bc6bf75-5ljd6" May 16 00:29:27.833581 kubelet[1969]: I0516 00:29:27.833217 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-txrhs\" (UniqueName: \"kubernetes.io/projected/36eff84d-3803-4eb4-84f8-c35a9b585290-kube-api-access-txrhs\") pod \"calico-typha-866bc6bf75-5ljd6\" (UID: \"36eff84d-3803-4eb4-84f8-c35a9b585290\") " pod="calico-system/calico-typha-866bc6bf75-5ljd6" May 16 00:29:28.059774 kubelet[1969]: E0516 00:29:28.059661 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:28.063462 env[1215]: time="2025-05-16T00:29:28.060159547Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-866bc6bf75-5ljd6,Uid:36eff84d-3803-4eb4-84f8-c35a9b585290,Namespace:calico-system,Attempt:0,}" May 16 00:29:28.084453 env[1215]: time="2025-05-16T00:29:28.084384196Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:28.084650 env[1215]: time="2025-05-16T00:29:28.084625396Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:28.084734 env[1215]: time="2025-05-16T00:29:28.084714597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:28.084955 env[1215]: time="2025-05-16T00:29:28.084926277Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/230295d55fb8d134bef885471c9df4930c00f33be771614d21546d05cfffbae7 pid=2393 runtime=io.containerd.runc.v2 May 16 00:29:28.110220 systemd[1]: Created slice kubepods-besteffort-pod74ea0ee3_ff02_4c63_8f75_ed6b77218fba.slice. May 16 00:29:28.127245 systemd[1]: Started cri-containerd-230295d55fb8d134bef885471c9df4930c00f33be771614d21546d05cfffbae7.scope. May 16 00:29:28.135445 kubelet[1969]: I0516 00:29:28.135092 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-var-run-calico\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135445 kubelet[1969]: I0516 00:29:28.135132 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-xtables-lock\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135445 kubelet[1969]: I0516 00:29:28.135152 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-policysync\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135445 kubelet[1969]: I0516 00:29:28.135180 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-flexvol-driver-host\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135445 kubelet[1969]: I0516 00:29:28.135207 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-cni-log-dir\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135672 kubelet[1969]: I0516 00:29:28.135222 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-var-lib-calico\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135672 kubelet[1969]: I0516 00:29:28.135239 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-lib-modules\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135672 kubelet[1969]: I0516 00:29:28.135254 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-tigera-ca-bundle\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135672 kubelet[1969]: I0516 00:29:28.135269 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-cni-bin-dir\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135672 kubelet[1969]: I0516 00:29:28.135283 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-cni-net-dir\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135898 kubelet[1969]: I0516 00:29:28.135300 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-node-certs\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.135898 kubelet[1969]: I0516 00:29:28.135318 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4276g\" (UniqueName: \"kubernetes.io/projected/74ea0ee3-ff02-4c63-8f75-ed6b77218fba-kube-api-access-4276g\") pod \"calico-node-j5flv\" (UID: \"74ea0ee3-ff02-4c63-8f75-ed6b77218fba\") " pod="calico-system/calico-node-j5flv" May 16 00:29:28.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.190000 audit: BPF prog-id=115 op=LOAD May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2393 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303239356435356662386431333462656638383534373163396466 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2393 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303239356435356662386431333462656638383534373163396466 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit: BPF prog-id=116 op=LOAD May 16 00:29:28.191000 audit[2402]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2393 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303239356435356662386431333462656638383534373163396466 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit: BPF prog-id=117 op=LOAD May 16 00:29:28.191000 audit[2402]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2393 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303239356435356662386431333462656638383534373163396466 May 16 00:29:28.191000 audit: BPF prog-id=117 op=UNLOAD May 16 00:29:28.191000 audit: BPF prog-id=116 op=UNLOAD May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { perfmon } for pid=2402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit[2402]: AVC avc: denied { bpf } for pid=2402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.191000 audit: BPF prog-id=118 op=LOAD May 16 00:29:28.191000 audit[2402]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2393 pid=2402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233303239356435356662386431333462656638383534373163396466 May 16 00:29:28.210226 env[1215]: time="2025-05-16T00:29:28.210145689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-866bc6bf75-5ljd6,Uid:36eff84d-3803-4eb4-84f8-c35a9b585290,Namespace:calico-system,Attempt:0,} returns sandbox id \"230295d55fb8d134bef885471c9df4930c00f33be771614d21546d05cfffbae7\"" May 16 00:29:28.211272 kubelet[1969]: E0516 00:29:28.210929 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:28.211722 env[1215]: time="2025-05-16T00:29:28.211696532Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 16 00:29:28.237758 kubelet[1969]: E0516 00:29:28.237733 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.237758 kubelet[1969]: W0516 00:29:28.237752 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.238301 kubelet[1969]: E0516 00:29:28.238280 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.245640 kubelet[1969]: E0516 00:29:28.245615 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.245640 kubelet[1969]: W0516 00:29:28.245633 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.245754 kubelet[1969]: E0516 00:29:28.245647 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.247731 kubelet[1969]: E0516 00:29:28.247712 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.247731 kubelet[1969]: W0516 00:29:28.247728 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.247834 kubelet[1969]: E0516 00:29:28.247742 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.336203 kubelet[1969]: E0516 00:29:28.336061 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dr4tx" podUID="c3fcf332-4196-4b8e-81cc-4698dfec5b10" May 16 00:29:28.415706 env[1215]: time="2025-05-16T00:29:28.415658902Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j5flv,Uid:74ea0ee3-ff02-4c63-8f75-ed6b77218fba,Namespace:calico-system,Attempt:0,}" May 16 00:29:28.429104 kubelet[1969]: E0516 00:29:28.429074 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.429269 kubelet[1969]: W0516 00:29:28.429252 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.429369 kubelet[1969]: E0516 00:29:28.429343 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.429586 kubelet[1969]: E0516 00:29:28.429574 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.429703 kubelet[1969]: W0516 00:29:28.429657 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.429778 kubelet[1969]: E0516 00:29:28.429765 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.430280 env[1215]: time="2025-05-16T00:29:28.430114171Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:28.430280 env[1215]: time="2025-05-16T00:29:28.430225571Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:28.430399 env[1215]: time="2025-05-16T00:29:28.430238731Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:28.430561 env[1215]: time="2025-05-16T00:29:28.430439452Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd pid=2437 runtime=io.containerd.runc.v2 May 16 00:29:28.430686 kubelet[1969]: E0516 00:29:28.430670 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.430754 kubelet[1969]: W0516 00:29:28.430742 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.430816 kubelet[1969]: E0516 00:29:28.430804 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.431462 kubelet[1969]: E0516 00:29:28.431446 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.431551 kubelet[1969]: W0516 00:29:28.431538 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.431637 kubelet[1969]: E0516 00:29:28.431624 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.431881 kubelet[1969]: E0516 00:29:28.431869 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.431966 kubelet[1969]: W0516 00:29:28.431952 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.432027 kubelet[1969]: E0516 00:29:28.432015 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.432290 kubelet[1969]: E0516 00:29:28.432277 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.432393 kubelet[1969]: W0516 00:29:28.432378 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.432459 kubelet[1969]: E0516 00:29:28.432447 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.432690 kubelet[1969]: E0516 00:29:28.432676 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.432782 kubelet[1969]: W0516 00:29:28.432762 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.432842 kubelet[1969]: E0516 00:29:28.432830 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.433073 kubelet[1969]: E0516 00:29:28.433059 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.433157 kubelet[1969]: W0516 00:29:28.433144 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.433245 kubelet[1969]: E0516 00:29:28.433232 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.434815 kubelet[1969]: E0516 00:29:28.434797 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.434908 kubelet[1969]: W0516 00:29:28.434892 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.434982 kubelet[1969]: E0516 00:29:28.434968 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.435285 kubelet[1969]: E0516 00:29:28.435270 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.435378 kubelet[1969]: W0516 00:29:28.435363 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.435450 kubelet[1969]: E0516 00:29:28.435438 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.436459 kubelet[1969]: E0516 00:29:28.436443 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.436594 kubelet[1969]: W0516 00:29:28.436573 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.436662 kubelet[1969]: E0516 00:29:28.436649 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.436940 kubelet[1969]: E0516 00:29:28.436926 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.437037 kubelet[1969]: W0516 00:29:28.437023 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.437110 kubelet[1969]: E0516 00:29:28.437098 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.437970 kubelet[1969]: E0516 00:29:28.437954 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.438074 kubelet[1969]: W0516 00:29:28.438060 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.438145 kubelet[1969]: E0516 00:29:28.438132 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.444674 kubelet[1969]: E0516 00:29:28.444653 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.444788 kubelet[1969]: W0516 00:29:28.444773 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.444870 kubelet[1969]: E0516 00:29:28.444855 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.445518 kubelet[1969]: E0516 00:29:28.445497 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.445600 kubelet[1969]: W0516 00:29:28.445587 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.445669 kubelet[1969]: E0516 00:29:28.445657 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.446749 kubelet[1969]: E0516 00:29:28.446732 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.447857 kubelet[1969]: W0516 00:29:28.447830 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.447922 kubelet[1969]: E0516 00:29:28.447910 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.448272 kubelet[1969]: E0516 00:29:28.448258 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.448383 kubelet[1969]: W0516 00:29:28.448366 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.448449 kubelet[1969]: E0516 00:29:28.448437 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.448676 kubelet[1969]: E0516 00:29:28.448664 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.448757 kubelet[1969]: W0516 00:29:28.448742 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.448816 kubelet[1969]: E0516 00:29:28.448805 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.449076 kubelet[1969]: E0516 00:29:28.449065 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.449144 kubelet[1969]: W0516 00:29:28.449132 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.449226 kubelet[1969]: E0516 00:29:28.449212 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.449451 kubelet[1969]: E0516 00:29:28.449441 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.449605 kubelet[1969]: W0516 00:29:28.449589 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.449681 kubelet[1969]: E0516 00:29:28.449669 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.450100 kubelet[1969]: E0516 00:29:28.450087 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.450221 kubelet[1969]: W0516 00:29:28.450206 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.450342 kubelet[1969]: E0516 00:29:28.450327 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.450440 kubelet[1969]: I0516 00:29:28.450423 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6b4r2\" (UniqueName: \"kubernetes.io/projected/c3fcf332-4196-4b8e-81cc-4698dfec5b10-kube-api-access-6b4r2\") pod \"csi-node-driver-dr4tx\" (UID: \"c3fcf332-4196-4b8e-81cc-4698dfec5b10\") " pod="calico-system/csi-node-driver-dr4tx" May 16 00:29:28.450709 kubelet[1969]: E0516 00:29:28.450692 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.450709 kubelet[1969]: W0516 00:29:28.450709 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.450804 kubelet[1969]: E0516 00:29:28.450728 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.450908 kubelet[1969]: E0516 00:29:28.450890 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.450908 kubelet[1969]: W0516 00:29:28.450904 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.450967 kubelet[1969]: E0516 00:29:28.450914 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.451121 kubelet[1969]: E0516 00:29:28.451109 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.451121 kubelet[1969]: W0516 00:29:28.451121 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.451213 kubelet[1969]: E0516 00:29:28.451131 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.451213 kubelet[1969]: I0516 00:29:28.451153 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/c3fcf332-4196-4b8e-81cc-4698dfec5b10-kubelet-dir\") pod \"csi-node-driver-dr4tx\" (UID: \"c3fcf332-4196-4b8e-81cc-4698dfec5b10\") " pod="calico-system/csi-node-driver-dr4tx" May 16 00:29:28.451340 kubelet[1969]: E0516 00:29:28.451321 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.451340 kubelet[1969]: W0516 00:29:28.451336 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.451406 kubelet[1969]: E0516 00:29:28.451346 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.451406 kubelet[1969]: I0516 00:29:28.451371 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/c3fcf332-4196-4b8e-81cc-4698dfec5b10-socket-dir\") pod \"csi-node-driver-dr4tx\" (UID: \"c3fcf332-4196-4b8e-81cc-4698dfec5b10\") " pod="calico-system/csi-node-driver-dr4tx" May 16 00:29:28.451894 systemd[1]: Started cri-containerd-96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd.scope. May 16 00:29:28.452404 kubelet[1969]: E0516 00:29:28.452314 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.452404 kubelet[1969]: W0516 00:29:28.452329 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.452404 kubelet[1969]: E0516 00:29:28.452349 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.452404 kubelet[1969]: I0516 00:29:28.452373 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/c3fcf332-4196-4b8e-81cc-4698dfec5b10-registration-dir\") pod \"csi-node-driver-dr4tx\" (UID: \"c3fcf332-4196-4b8e-81cc-4698dfec5b10\") " pod="calico-system/csi-node-driver-dr4tx" May 16 00:29:28.452725 kubelet[1969]: E0516 00:29:28.452706 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.452725 kubelet[1969]: W0516 00:29:28.452721 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.452891 kubelet[1969]: E0516 00:29:28.452869 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.452977 kubelet[1969]: I0516 00:29:28.452962 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/c3fcf332-4196-4b8e-81cc-4698dfec5b10-varrun\") pod \"csi-node-driver-dr4tx\" (UID: \"c3fcf332-4196-4b8e-81cc-4698dfec5b10\") " pod="calico-system/csi-node-driver-dr4tx" May 16 00:29:28.453000 audit[2483]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:28.453000 audit[2483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffdc66d370 a2=0 a3=1 items=0 ppid=2082 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.453000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:28.456925 kubelet[1969]: E0516 00:29:28.456904 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.456925 kubelet[1969]: W0516 00:29:28.456921 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.457042 kubelet[1969]: E0516 00:29:28.457022 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.457190 kubelet[1969]: E0516 00:29:28.457158 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.457190 kubelet[1969]: W0516 00:29:28.457181 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.457264 kubelet[1969]: E0516 00:29:28.457206 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.457419 kubelet[1969]: E0516 00:29:28.457401 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.457449 kubelet[1969]: W0516 00:29:28.457418 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.457539 kubelet[1969]: E0516 00:29:28.457520 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.458031 kubelet[1969]: E0516 00:29:28.458016 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.458031 kubelet[1969]: W0516 00:29:28.458030 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.458147 kubelet[1969]: E0516 00:29:28.458132 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.457000 audit[2483]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2483 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:28.459320 kubelet[1969]: E0516 00:29:28.459289 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.459320 kubelet[1969]: W0516 00:29:28.459303 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.459320 kubelet[1969]: E0516 00:29:28.459316 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.459567 kubelet[1969]: E0516 00:29:28.459548 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.459567 kubelet[1969]: W0516 00:29:28.459565 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.459644 kubelet[1969]: E0516 00:29:28.459575 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.457000 audit[2483]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdc66d370 a2=0 a3=1 items=0 ppid=2082 pid=2483 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:28.459879 kubelet[1969]: E0516 00:29:28.459866 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.459879 kubelet[1969]: W0516 00:29:28.459876 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.459947 kubelet[1969]: E0516 00:29:28.459885 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.460084 kubelet[1969]: E0516 00:29:28.460071 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.460084 kubelet[1969]: W0516 00:29:28.460082 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.460131 kubelet[1969]: E0516 00:29:28.460091 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.505000 audit: BPF prog-id=119 op=LOAD May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2437 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563613631313161303362353566306333626361363833356135 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2437 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563613631313161303362353566306333626361363833356135 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit: BPF prog-id=120 op=LOAD May 16 00:29:28.506000 audit[2449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2437 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563613631313161303362353566306333626361363833356135 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit: BPF prog-id=121 op=LOAD May 16 00:29:28.506000 audit[2449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2437 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563613631313161303362353566306333626361363833356135 May 16 00:29:28.506000 audit: BPF prog-id=121 op=UNLOAD May 16 00:29:28.506000 audit: BPF prog-id=120 op=UNLOAD May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:28.506000 audit: BPF prog-id=122 op=LOAD May 16 00:29:28.506000 audit[2449]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2437 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:28.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936633563613631313161303362353566306333626361363833356135 May 16 00:29:28.541640 env[1215]: time="2025-05-16T00:29:28.541596715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-j5flv,Uid:74ea0ee3-ff02-4c63-8f75-ed6b77218fba,Namespace:calico-system,Attempt:0,} returns sandbox id \"96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd\"" May 16 00:29:28.553648 kubelet[1969]: E0516 00:29:28.553611 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.553648 kubelet[1969]: W0516 00:29:28.553637 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.553648 kubelet[1969]: E0516 00:29:28.553655 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.553948 kubelet[1969]: E0516 00:29:28.553886 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.553948 kubelet[1969]: W0516 00:29:28.553901 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.553948 kubelet[1969]: E0516 00:29:28.553912 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.554112 kubelet[1969]: E0516 00:29:28.554093 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.554112 kubelet[1969]: W0516 00:29:28.554106 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.554305 kubelet[1969]: E0516 00:29:28.554119 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.554305 kubelet[1969]: E0516 00:29:28.554287 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.554305 kubelet[1969]: W0516 00:29:28.554295 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.554305 kubelet[1969]: E0516 00:29:28.554304 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.554561 kubelet[1969]: E0516 00:29:28.554528 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.554561 kubelet[1969]: W0516 00:29:28.554548 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.554634 kubelet[1969]: E0516 00:29:28.554569 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.554754 kubelet[1969]: E0516 00:29:28.554730 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.554754 kubelet[1969]: W0516 00:29:28.554741 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.554754 kubelet[1969]: E0516 00:29:28.554753 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.554909 kubelet[1969]: E0516 00:29:28.554896 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.554909 kubelet[1969]: W0516 00:29:28.554906 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.554979 kubelet[1969]: E0516 00:29:28.554945 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.555045 kubelet[1969]: E0516 00:29:28.555034 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.555045 kubelet[1969]: W0516 00:29:28.555043 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.555180 kubelet[1969]: E0516 00:29:28.555079 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.555228 kubelet[1969]: E0516 00:29:28.555212 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.555228 kubelet[1969]: W0516 00:29:28.555221 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.555303 kubelet[1969]: E0516 00:29:28.555234 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.555474 kubelet[1969]: E0516 00:29:28.555462 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.555474 kubelet[1969]: W0516 00:29:28.555473 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.555549 kubelet[1969]: E0516 00:29:28.555494 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.555622 kubelet[1969]: E0516 00:29:28.555611 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.555664 kubelet[1969]: W0516 00:29:28.555625 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.555664 kubelet[1969]: E0516 00:29:28.555647 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.555770 kubelet[1969]: E0516 00:29:28.555760 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.555770 kubelet[1969]: W0516 00:29:28.555770 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.555850 kubelet[1969]: E0516 00:29:28.555786 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.555949 kubelet[1969]: E0516 00:29:28.555939 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.555988 kubelet[1969]: W0516 00:29:28.555949 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.555988 kubelet[1969]: E0516 00:29:28.555963 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.556149 kubelet[1969]: E0516 00:29:28.556134 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.556149 kubelet[1969]: W0516 00:29:28.556146 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.556271 kubelet[1969]: E0516 00:29:28.556159 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.556343 kubelet[1969]: E0516 00:29:28.556331 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.556343 kubelet[1969]: W0516 00:29:28.556341 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.556414 kubelet[1969]: E0516 00:29:28.556360 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.556552 kubelet[1969]: E0516 00:29:28.556541 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.556552 kubelet[1969]: W0516 00:29:28.556552 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.556623 kubelet[1969]: E0516 00:29:28.556561 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.556734 kubelet[1969]: E0516 00:29:28.556723 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.556767 kubelet[1969]: W0516 00:29:28.556735 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.556767 kubelet[1969]: E0516 00:29:28.556746 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.556901 kubelet[1969]: E0516 00:29:28.556890 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.556901 kubelet[1969]: W0516 00:29:28.556901 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.556977 kubelet[1969]: E0516 00:29:28.556968 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.557150 kubelet[1969]: E0516 00:29:28.557139 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.557220 kubelet[1969]: W0516 00:29:28.557152 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.557273 kubelet[1969]: E0516 00:29:28.557255 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.557355 kubelet[1969]: E0516 00:29:28.557339 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.557398 kubelet[1969]: W0516 00:29:28.557348 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.557479 kubelet[1969]: E0516 00:29:28.557447 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.557541 kubelet[1969]: E0516 00:29:28.557528 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.557541 kubelet[1969]: W0516 00:29:28.557539 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.557601 kubelet[1969]: E0516 00:29:28.557552 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.557712 kubelet[1969]: E0516 00:29:28.557697 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.557756 kubelet[1969]: W0516 00:29:28.557713 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.557756 kubelet[1969]: E0516 00:29:28.557726 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.557900 kubelet[1969]: E0516 00:29:28.557888 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.557900 kubelet[1969]: W0516 00:29:28.557899 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.557972 kubelet[1969]: E0516 00:29:28.557908 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.558054 kubelet[1969]: E0516 00:29:28.558044 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.558054 kubelet[1969]: W0516 00:29:28.558054 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.558128 kubelet[1969]: E0516 00:29:28.558062 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.558240 kubelet[1969]: E0516 00:29:28.558229 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.558240 kubelet[1969]: W0516 00:29:28.558240 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.558303 kubelet[1969]: E0516 00:29:28.558248 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:28.570195 kubelet[1969]: E0516 00:29:28.570143 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:28.570195 kubelet[1969]: W0516 00:29:28.570162 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:28.570195 kubelet[1969]: E0516 00:29:28.570194 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:29.275365 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3716063457.mount: Deactivated successfully. May 16 00:29:29.835210 env[1215]: time="2025-05-16T00:29:29.835148050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:29.837441 env[1215]: time="2025-05-16T00:29:29.837406574Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:29.839043 env[1215]: time="2025-05-16T00:29:29.838993537Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:29.840493 env[1215]: time="2025-05-16T00:29:29.840466100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:29.841015 env[1215]: time="2025-05-16T00:29:29.840982941Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb\"" May 16 00:29:29.844236 env[1215]: time="2025-05-16T00:29:29.844195947Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 16 00:29:29.858765 env[1215]: time="2025-05-16T00:29:29.858706055Z" level=info msg="CreateContainer within sandbox \"230295d55fb8d134bef885471c9df4930c00f33be771614d21546d05cfffbae7\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 16 00:29:29.869594 env[1215]: time="2025-05-16T00:29:29.869545035Z" level=info msg="CreateContainer within sandbox \"230295d55fb8d134bef885471c9df4930c00f33be771614d21546d05cfffbae7\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e87ca87b7b761a3d9939ccc5c7aabf064c42c63f649c0ac5dcc34c7e60dd2550\"" May 16 00:29:29.870430 env[1215]: time="2025-05-16T00:29:29.870392317Z" level=info msg="StartContainer for \"e87ca87b7b761a3d9939ccc5c7aabf064c42c63f649c0ac5dcc34c7e60dd2550\"" May 16 00:29:29.893851 systemd[1]: Started cri-containerd-e87ca87b7b761a3d9939ccc5c7aabf064c42c63f649c0ac5dcc34c7e60dd2550.scope. May 16 00:29:29.925687 kernel: kauditd_printk_skb: 139 callbacks suppressed May 16 00:29:29.925795 kernel: audit: type=1400 audit(1747355369.923:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.929610 kernel: audit: type=1400 audit(1747355369.923:979): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.929673 kernel: audit: type=1400 audit(1747355369.923:980): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.929839 kubelet[1969]: E0516 00:29:29.929793 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dr4tx" podUID="c3fcf332-4196-4b8e-81cc-4698dfec5b10" May 16 00:29:29.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.934053 kernel: audit: type=1400 audit(1747355369.923:981): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.936464 kernel: audit: type=1400 audit(1747355369.923:982): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.940941 kernel: audit: type=1400 audit(1747355369.923:983): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.941000 kernel: audit: type=1400 audit(1747355369.923:984): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.941022 kernel: audit: type=1400 audit(1747355369.923:985): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.943194 kernel: audit: type=1400 audit(1747355369.923:986): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.946870 kernel: audit: type=1400 audit(1747355369.924:987): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.924000 audit: BPF prog-id=123 op=LOAD May 16 00:29:29.926000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:29.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376361383762376237363161336439393339636363356337616162 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:29.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376361383762376237363161336439393339636363356337616162 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.926000 audit: BPF prog-id=124 op=LOAD May 16 00:29:29.926000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:29.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376361383762376237363161336439393339636363356337616162 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.928000 audit: BPF prog-id=125 op=LOAD May 16 00:29:29.928000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:29.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376361383762376237363161336439393339636363356337616162 May 16 00:29:29.930000 audit: BPF prog-id=125 op=UNLOAD May 16 00:29:29.930000 audit: BPF prog-id=124 op=UNLOAD May 16 00:29:29.930000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { perfmon } for pid=2542 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit[2542]: AVC avc: denied { bpf } for pid=2542 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:29.930000 audit: BPF prog-id=126 op=LOAD May 16 00:29:29.930000 audit[2542]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2393 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:29.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538376361383762376237363161336439393339636363356337616162 May 16 00:29:29.958710 env[1215]: time="2025-05-16T00:29:29.958658203Z" level=info msg="StartContainer for \"e87ca87b7b761a3d9939ccc5c7aabf064c42c63f649c0ac5dcc34c7e60dd2550\" returns successfully" May 16 00:29:29.979483 kubelet[1969]: E0516 00:29:29.979445 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:29.995669 kubelet[1969]: I0516 00:29:29.995593 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-866bc6bf75-5ljd6" podStartSLOduration=1.364469259 podStartE2EDuration="2.995578552s" podCreationTimestamp="2025-05-16 00:29:27 +0000 UTC" firstStartedPulling="2025-05-16 00:29:28.211429771 +0000 UTC m=+18.365438512" lastFinishedPulling="2025-05-16 00:29:29.842539104 +0000 UTC m=+19.996547805" observedRunningTime="2025-05-16 00:29:29.995260072 +0000 UTC m=+20.149268813" watchObservedRunningTime="2025-05-16 00:29:29.995578552 +0000 UTC m=+20.149587253" May 16 00:29:30.064011 kubelet[1969]: E0516 00:29:30.062512 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064011 kubelet[1969]: W0516 00:29:30.062535 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064011 kubelet[1969]: E0516 00:29:30.062557 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064011 kubelet[1969]: E0516 00:29:30.062750 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064011 kubelet[1969]: W0516 00:29:30.062759 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064011 kubelet[1969]: E0516 00:29:30.062807 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064011 kubelet[1969]: E0516 00:29:30.062953 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064011 kubelet[1969]: W0516 00:29:30.062962 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064011 kubelet[1969]: E0516 00:29:30.062971 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064011 kubelet[1969]: E0516 00:29:30.063100 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064402 kubelet[1969]: W0516 00:29:30.063112 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064402 kubelet[1969]: E0516 00:29:30.063122 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064402 kubelet[1969]: E0516 00:29:30.063298 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064402 kubelet[1969]: W0516 00:29:30.063306 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064402 kubelet[1969]: E0516 00:29:30.063314 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064402 kubelet[1969]: E0516 00:29:30.063490 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064402 kubelet[1969]: W0516 00:29:30.063498 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064402 kubelet[1969]: E0516 00:29:30.063506 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064402 kubelet[1969]: E0516 00:29:30.063649 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064402 kubelet[1969]: W0516 00:29:30.063656 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064623 kubelet[1969]: E0516 00:29:30.063663 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064623 kubelet[1969]: E0516 00:29:30.063821 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064623 kubelet[1969]: W0516 00:29:30.063830 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064623 kubelet[1969]: E0516 00:29:30.063838 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064623 kubelet[1969]: E0516 00:29:30.063983 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064623 kubelet[1969]: W0516 00:29:30.063994 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064623 kubelet[1969]: E0516 00:29:30.064001 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064623 kubelet[1969]: E0516 00:29:30.064117 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064623 kubelet[1969]: W0516 00:29:30.064123 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064623 kubelet[1969]: E0516 00:29:30.064130 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064838 kubelet[1969]: E0516 00:29:30.064260 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064838 kubelet[1969]: W0516 00:29:30.064267 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064838 kubelet[1969]: E0516 00:29:30.064274 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064838 kubelet[1969]: E0516 00:29:30.064452 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064838 kubelet[1969]: W0516 00:29:30.064462 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064838 kubelet[1969]: E0516 00:29:30.064471 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064838 kubelet[1969]: E0516 00:29:30.064618 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.064838 kubelet[1969]: W0516 00:29:30.064626 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.064838 kubelet[1969]: E0516 00:29:30.064634 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.064838 kubelet[1969]: E0516 00:29:30.064749 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.065082 kubelet[1969]: W0516 00:29:30.064756 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.065082 kubelet[1969]: E0516 00:29:30.064763 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.065082 kubelet[1969]: E0516 00:29:30.064868 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.065082 kubelet[1969]: W0516 00:29:30.064875 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.065082 kubelet[1969]: E0516 00:29:30.064883 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.068606 kubelet[1969]: E0516 00:29:30.066925 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.068606 kubelet[1969]: W0516 00:29:30.066943 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.068606 kubelet[1969]: E0516 00:29:30.066955 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.068606 kubelet[1969]: E0516 00:29:30.067102 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.068606 kubelet[1969]: W0516 00:29:30.067110 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.068606 kubelet[1969]: E0516 00:29:30.067118 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.068606 kubelet[1969]: E0516 00:29:30.067535 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.068606 kubelet[1969]: W0516 00:29:30.067545 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.068606 kubelet[1969]: E0516 00:29:30.067553 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.068898 kubelet[1969]: E0516 00:29:30.068722 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.068898 kubelet[1969]: W0516 00:29:30.068760 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.068898 kubelet[1969]: E0516 00:29:30.068788 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.070829 kubelet[1969]: E0516 00:29:30.070332 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.070829 kubelet[1969]: W0516 00:29:30.070354 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.070829 kubelet[1969]: E0516 00:29:30.070408 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.070829 kubelet[1969]: E0516 00:29:30.070647 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.070829 kubelet[1969]: W0516 00:29:30.070680 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.070829 kubelet[1969]: E0516 00:29:30.070736 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.070970 kubelet[1969]: E0516 00:29:30.070861 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.070970 kubelet[1969]: W0516 00:29:30.070907 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.070970 kubelet[1969]: E0516 00:29:30.070936 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.072381 kubelet[1969]: E0516 00:29:30.072361 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.072381 kubelet[1969]: W0516 00:29:30.072379 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.072480 kubelet[1969]: E0516 00:29:30.072456 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.072739 kubelet[1969]: E0516 00:29:30.072721 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.072739 kubelet[1969]: W0516 00:29:30.072737 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.072827 kubelet[1969]: E0516 00:29:30.072755 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.073146 kubelet[1969]: E0516 00:29:30.072902 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.073146 kubelet[1969]: W0516 00:29:30.072916 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.073146 kubelet[1969]: E0516 00:29:30.072931 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.073287 kubelet[1969]: E0516 00:29:30.073274 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.073287 kubelet[1969]: W0516 00:29:30.073286 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.073335 kubelet[1969]: E0516 00:29:30.073322 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.075512 kubelet[1969]: E0516 00:29:30.073478 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.075512 kubelet[1969]: W0516 00:29:30.073493 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.075512 kubelet[1969]: E0516 00:29:30.073586 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.075512 kubelet[1969]: E0516 00:29:30.073692 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.075512 kubelet[1969]: W0516 00:29:30.073700 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.075512 kubelet[1969]: E0516 00:29:30.073714 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.075512 kubelet[1969]: E0516 00:29:30.073960 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.075512 kubelet[1969]: W0516 00:29:30.073976 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.075512 kubelet[1969]: E0516 00:29:30.073994 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.075512 kubelet[1969]: E0516 00:29:30.074189 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.075812 kubelet[1969]: W0516 00:29:30.074197 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.075812 kubelet[1969]: E0516 00:29:30.074208 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.075812 kubelet[1969]: E0516 00:29:30.074526 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.075812 kubelet[1969]: W0516 00:29:30.074536 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.075812 kubelet[1969]: E0516 00:29:30.074593 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.075812 kubelet[1969]: E0516 00:29:30.074762 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.075812 kubelet[1969]: W0516 00:29:30.074771 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.075812 kubelet[1969]: E0516 00:29:30.074782 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.075812 kubelet[1969]: E0516 00:29:30.074961 1969 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:29:30.075812 kubelet[1969]: W0516 00:29:30.074970 1969 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:29:30.076014 kubelet[1969]: E0516 00:29:30.074978 1969 plugins.go:695] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:29:30.733657 env[1215]: time="2025-05-16T00:29:30.733612817Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:30.736376 env[1215]: time="2025-05-16T00:29:30.736340422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:30.738080 env[1215]: time="2025-05-16T00:29:30.738049745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:30.739467 env[1215]: time="2025-05-16T00:29:30.739434347Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:30.740045 env[1215]: time="2025-05-16T00:29:30.740018628Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 16 00:29:30.746029 env[1215]: time="2025-05-16T00:29:30.745976519Z" level=info msg="CreateContainer within sandbox \"96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 16 00:29:30.755631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1039196061.mount: Deactivated successfully. May 16 00:29:30.758903 env[1215]: time="2025-05-16T00:29:30.758858101Z" level=info msg="CreateContainer within sandbox \"96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37\"" May 16 00:29:30.759523 env[1215]: time="2025-05-16T00:29:30.759491143Z" level=info msg="StartContainer for \"ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37\"" May 16 00:29:30.789675 systemd[1]: Started cri-containerd-ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37.scope. May 16 00:29:30.807000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2437 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:30.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363838636135333366343136353437623836306134653538363163 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.807000 audit: BPF prog-id=127 op=LOAD May 16 00:29:30.807000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2437 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:30.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363838636135333366343136353437623836306134653538363163 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit: BPF prog-id=128 op=LOAD May 16 00:29:30.808000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2437 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:30.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363838636135333366343136353437623836306134653538363163 May 16 00:29:30.808000 audit: BPF prog-id=128 op=UNLOAD May 16 00:29:30.808000 audit: BPF prog-id=127 op=UNLOAD May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:30.808000 audit: BPF prog-id=129 op=LOAD May 16 00:29:30.808000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2437 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:30.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565363838636135333366343136353437623836306134653538363163 May 16 00:29:30.826771 env[1215]: time="2025-05-16T00:29:30.826720021Z" level=info msg="StartContainer for \"ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37\" returns successfully" May 16 00:29:30.851130 systemd[1]: cri-containerd-ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37.scope: Deactivated successfully. May 16 00:29:30.857000 audit: BPF prog-id=129 op=UNLOAD May 16 00:29:30.937916 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37-rootfs.mount: Deactivated successfully. May 16 00:29:30.967587 env[1215]: time="2025-05-16T00:29:30.967542070Z" level=info msg="shim disconnected" id=ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37 May 16 00:29:30.968062 env[1215]: time="2025-05-16T00:29:30.968040391Z" level=warning msg="cleaning up after shim disconnected" id=ee688ca533f416547b860a4e5861ca7411a06a438188c712918350a3f3d36c37 namespace=k8s.io May 16 00:29:30.968150 env[1215]: time="2025-05-16T00:29:30.968136911Z" level=info msg="cleaning up dead shim" May 16 00:29:30.974915 env[1215]: time="2025-05-16T00:29:30.974880083Z" level=warning msg="cleanup warnings time=\"2025-05-16T00:29:30Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2656 runtime=io.containerd.runc.v2\n" May 16 00:29:30.983519 kubelet[1969]: I0516 00:29:30.982440 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:29:30.983519 kubelet[1969]: E0516 00:29:30.982708 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:30.986229 env[1215]: time="2025-05-16T00:29:30.984150459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 16 00:29:31.927779 kubelet[1969]: E0516 00:29:31.927434 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dr4tx" podUID="c3fcf332-4196-4b8e-81cc-4698dfec5b10" May 16 00:29:33.257581 env[1215]: time="2025-05-16T00:29:33.257536231Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:33.258723 env[1215]: time="2025-05-16T00:29:33.258691993Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:33.261095 env[1215]: time="2025-05-16T00:29:33.261053596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:33.262453 env[1215]: time="2025-05-16T00:29:33.262425118Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:33.262927 env[1215]: time="2025-05-16T00:29:33.262895759Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 16 00:29:33.265331 env[1215]: time="2025-05-16T00:29:33.265287043Z" level=info msg="CreateContainer within sandbox \"96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 16 00:29:33.276225 env[1215]: time="2025-05-16T00:29:33.276186259Z" level=info msg="CreateContainer within sandbox \"96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac\"" May 16 00:29:33.278199 env[1215]: time="2025-05-16T00:29:33.278159381Z" level=info msg="StartContainer for \"6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac\"" May 16 00:29:33.302727 systemd[1]: run-containerd-runc-k8s.io-6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac-runc.MvBjbW.mount: Deactivated successfully. May 16 00:29:33.304291 systemd[1]: Started cri-containerd-6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac.scope. May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2437 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:33.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633961313837383430393465303031346166336463633532383361 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit: BPF prog-id=130 op=LOAD May 16 00:29:33.338000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2437 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:33.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633961313837383430393465303031346166336463633532383361 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit: BPF prog-id=131 op=LOAD May 16 00:29:33.338000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2437 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:33.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633961313837383430393465303031346166336463633532383361 May 16 00:29:33.338000 audit: BPF prog-id=131 op=UNLOAD May 16 00:29:33.338000 audit: BPF prog-id=130 op=UNLOAD May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { perfmon } for pid=2682 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit[2682]: AVC avc: denied { bpf } for pid=2682 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:33.338000 audit: BPF prog-id=132 op=LOAD May 16 00:29:33.338000 audit[2682]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2437 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:33.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663633961313837383430393465303031346166336463633532383361 May 16 00:29:33.354239 env[1215]: time="2025-05-16T00:29:33.354186732Z" level=info msg="StartContainer for \"6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac\" returns successfully" May 16 00:29:33.927202 kubelet[1969]: E0516 00:29:33.927129 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dr4tx" podUID="c3fcf332-4196-4b8e-81cc-4698dfec5b10" May 16 00:29:33.948137 env[1215]: time="2025-05-16T00:29:33.948076917Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 16 00:29:33.950481 systemd[1]: cri-containerd-6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac.scope: Deactivated successfully. May 16 00:29:33.954000 audit: BPF prog-id=132 op=UNLOAD May 16 00:29:34.025536 env[1215]: time="2025-05-16T00:29:34.025490187Z" level=info msg="shim disconnected" id=6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac May 16 00:29:34.025776 env[1215]: time="2025-05-16T00:29:34.025756107Z" level=warning msg="cleaning up after shim disconnected" id=6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac namespace=k8s.io May 16 00:29:34.025865 env[1215]: time="2025-05-16T00:29:34.025851627Z" level=info msg="cleaning up dead shim" May 16 00:29:34.032280 env[1215]: time="2025-05-16T00:29:34.032241076Z" level=warning msg="cleanup warnings time=\"2025-05-16T00:29:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2723 runtime=io.containerd.runc.v2\n" May 16 00:29:34.040021 kubelet[1969]: I0516 00:29:34.039888 1969 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 16 00:29:34.070443 systemd[1]: Created slice kubepods-burstable-podcc5835e5_f189_44ad_9314_f31fbd66b374.slice. May 16 00:29:34.074900 systemd[1]: Created slice kubepods-burstable-pode34e54e0_2fe6_43cf_a937_170d6e7994c7.slice. May 16 00:29:34.082697 systemd[1]: Created slice kubepods-besteffort-pod703f34ab_0c43_4709_b070_86f2f2f5a842.slice. May 16 00:29:34.087832 systemd[1]: Created slice kubepods-besteffort-poda85f3374_0afa_4eca_90fb_15cd72a69095.slice. May 16 00:29:34.091920 systemd[1]: Created slice kubepods-besteffort-podba00be6e_83e4_4188_a55e_ca7c09f4110b.slice. May 16 00:29:34.096008 systemd[1]: Created slice kubepods-besteffort-pod65084909_fdb1_447e_937c_06ab02b22440.slice. May 16 00:29:34.100383 systemd[1]: Created slice kubepods-besteffort-pod9f0bb5f5_a1b1_414f_a68e_79e577cbd224.slice. May 16 00:29:34.104430 kubelet[1969]: I0516 00:29:34.104396 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/cc5835e5-f189-44ad-9314-f31fbd66b374-config-volume\") pod \"coredns-668d6bf9bc-dsghd\" (UID: \"cc5835e5-f189-44ad-9314-f31fbd66b374\") " pod="kube-system/coredns-668d6bf9bc-dsghd" May 16 00:29:34.104534 kubelet[1969]: I0516 00:29:34.104441 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qs65m\" (UniqueName: \"kubernetes.io/projected/cc5835e5-f189-44ad-9314-f31fbd66b374-kube-api-access-qs65m\") pod \"coredns-668d6bf9bc-dsghd\" (UID: \"cc5835e5-f189-44ad-9314-f31fbd66b374\") " pod="kube-system/coredns-668d6bf9bc-dsghd" May 16 00:29:34.104534 kubelet[1969]: I0516 00:29:34.104464 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8xkhv\" (UniqueName: \"kubernetes.io/projected/65084909-fdb1-447e-937c-06ab02b22440-kube-api-access-8xkhv\") pod \"whisker-757f7fdb6b-td8lz\" (UID: \"65084909-fdb1-447e-937c-06ab02b22440\") " pod="calico-system/whisker-757f7fdb6b-td8lz" May 16 00:29:34.104534 kubelet[1969]: I0516 00:29:34.104480 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ba00be6e-83e4-4188-a55e-ca7c09f4110b-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-nggsx\" (UID: \"ba00be6e-83e4-4188-a55e-ca7c09f4110b\") " pod="calico-system/goldmane-78d55f7ddc-nggsx" May 16 00:29:34.104534 kubelet[1969]: I0516 00:29:34.104497 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/703f34ab-0c43-4709-b070-86f2f2f5a842-calico-apiserver-certs\") pod \"calico-apiserver-64555d77cf-2lds8\" (UID: \"703f34ab-0c43-4709-b070-86f2f2f5a842\") " pod="calico-apiserver/calico-apiserver-64555d77cf-2lds8" May 16 00:29:34.104534 kubelet[1969]: I0516 00:29:34.104512 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e34e54e0-2fe6-43cf-a937-170d6e7994c7-config-volume\") pod \"coredns-668d6bf9bc-sgdm4\" (UID: \"e34e54e0-2fe6-43cf-a937-170d6e7994c7\") " pod="kube-system/coredns-668d6bf9bc-sgdm4" May 16 00:29:34.104667 kubelet[1969]: I0516 00:29:34.104529 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-86bk7\" (UniqueName: \"kubernetes.io/projected/9f0bb5f5-a1b1-414f-a68e-79e577cbd224-kube-api-access-86bk7\") pod \"calico-apiserver-64555d77cf-5gb65\" (UID: \"9f0bb5f5-a1b1-414f-a68e-79e577cbd224\") " pod="calico-apiserver/calico-apiserver-64555d77cf-5gb65" May 16 00:29:34.104667 kubelet[1969]: I0516 00:29:34.104549 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/ba00be6e-83e4-4188-a55e-ca7c09f4110b-config\") pod \"goldmane-78d55f7ddc-nggsx\" (UID: \"ba00be6e-83e4-4188-a55e-ca7c09f4110b\") " pod="calico-system/goldmane-78d55f7ddc-nggsx" May 16 00:29:34.104667 kubelet[1969]: I0516 00:29:34.104568 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/65084909-fdb1-447e-937c-06ab02b22440-whisker-backend-key-pair\") pod \"whisker-757f7fdb6b-td8lz\" (UID: \"65084909-fdb1-447e-937c-06ab02b22440\") " pod="calico-system/whisker-757f7fdb6b-td8lz" May 16 00:29:34.104667 kubelet[1969]: I0516 00:29:34.104584 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/65084909-fdb1-447e-937c-06ab02b22440-whisker-ca-bundle\") pod \"whisker-757f7fdb6b-td8lz\" (UID: \"65084909-fdb1-447e-937c-06ab02b22440\") " pod="calico-system/whisker-757f7fdb6b-td8lz" May 16 00:29:34.104667 kubelet[1969]: I0516 00:29:34.104601 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/ba00be6e-83e4-4188-a55e-ca7c09f4110b-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-nggsx\" (UID: \"ba00be6e-83e4-4188-a55e-ca7c09f4110b\") " pod="calico-system/goldmane-78d55f7ddc-nggsx" May 16 00:29:34.104782 kubelet[1969]: I0516 00:29:34.104641 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7j9xc\" (UniqueName: \"kubernetes.io/projected/ba00be6e-83e4-4188-a55e-ca7c09f4110b-kube-api-access-7j9xc\") pod \"goldmane-78d55f7ddc-nggsx\" (UID: \"ba00be6e-83e4-4188-a55e-ca7c09f4110b\") " pod="calico-system/goldmane-78d55f7ddc-nggsx" May 16 00:29:34.104782 kubelet[1969]: I0516 00:29:34.104681 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mspgk\" (UniqueName: \"kubernetes.io/projected/703f34ab-0c43-4709-b070-86f2f2f5a842-kube-api-access-mspgk\") pod \"calico-apiserver-64555d77cf-2lds8\" (UID: \"703f34ab-0c43-4709-b070-86f2f2f5a842\") " pod="calico-apiserver/calico-apiserver-64555d77cf-2lds8" May 16 00:29:34.104782 kubelet[1969]: I0516 00:29:34.104703 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9f0bb5f5-a1b1-414f-a68e-79e577cbd224-calico-apiserver-certs\") pod \"calico-apiserver-64555d77cf-5gb65\" (UID: \"9f0bb5f5-a1b1-414f-a68e-79e577cbd224\") " pod="calico-apiserver/calico-apiserver-64555d77cf-5gb65" May 16 00:29:34.104782 kubelet[1969]: I0516 00:29:34.104735 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a85f3374-0afa-4eca-90fb-15cd72a69095-tigera-ca-bundle\") pod \"calico-kube-controllers-77d955dd94-m7xnx\" (UID: \"a85f3374-0afa-4eca-90fb-15cd72a69095\") " pod="calico-system/calico-kube-controllers-77d955dd94-m7xnx" May 16 00:29:34.104782 kubelet[1969]: I0516 00:29:34.104753 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-45xtf\" (UniqueName: \"kubernetes.io/projected/e34e54e0-2fe6-43cf-a937-170d6e7994c7-kube-api-access-45xtf\") pod \"coredns-668d6bf9bc-sgdm4\" (UID: \"e34e54e0-2fe6-43cf-a937-170d6e7994c7\") " pod="kube-system/coredns-668d6bf9bc-sgdm4" May 16 00:29:34.104893 kubelet[1969]: I0516 00:29:34.104772 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7cbwr\" (UniqueName: \"kubernetes.io/projected/a85f3374-0afa-4eca-90fb-15cd72a69095-kube-api-access-7cbwr\") pod \"calico-kube-controllers-77d955dd94-m7xnx\" (UID: \"a85f3374-0afa-4eca-90fb-15cd72a69095\") " pod="calico-system/calico-kube-controllers-77d955dd94-m7xnx" May 16 00:29:34.281665 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6cc9a18784094e0014af3dcc5283a2360aaebcc5fc905ab0f75653f6cf4f9dac-rootfs.mount: Deactivated successfully. May 16 00:29:34.373082 kubelet[1969]: E0516 00:29:34.373025 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:34.375724 env[1215]: time="2025-05-16T00:29:34.375298064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dsghd,Uid:cc5835e5-f189-44ad-9314-f31fbd66b374,Namespace:kube-system,Attempt:0,}" May 16 00:29:34.377679 kubelet[1969]: E0516 00:29:34.377652 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:34.378930 env[1215]: time="2025-05-16T00:29:34.378371309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-sgdm4,Uid:e34e54e0-2fe6-43cf-a937-170d6e7994c7,Namespace:kube-system,Attempt:0,}" May 16 00:29:34.387087 env[1215]: time="2025-05-16T00:29:34.387049320Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-2lds8,Uid:703f34ab-0c43-4709-b070-86f2f2f5a842,Namespace:calico-apiserver,Attempt:0,}" May 16 00:29:34.392398 env[1215]: time="2025-05-16T00:29:34.392205767Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d955dd94-m7xnx,Uid:a85f3374-0afa-4eca-90fb-15cd72a69095,Namespace:calico-system,Attempt:0,}" May 16 00:29:34.394105 env[1215]: time="2025-05-16T00:29:34.394039050Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nggsx,Uid:ba00be6e-83e4-4188-a55e-ca7c09f4110b,Namespace:calico-system,Attempt:0,}" May 16 00:29:34.406044 env[1215]: time="2025-05-16T00:29:34.403941383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-757f7fdb6b-td8lz,Uid:65084909-fdb1-447e-937c-06ab02b22440,Namespace:calico-system,Attempt:0,}" May 16 00:29:34.406882 env[1215]: time="2025-05-16T00:29:34.406656827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-5gb65,Uid:9f0bb5f5-a1b1-414f-a68e-79e577cbd224,Namespace:calico-apiserver,Attempt:0,}" May 16 00:29:34.674397 env[1215]: time="2025-05-16T00:29:34.674308912Z" level=error msg="Failed to destroy network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.674740 env[1215]: time="2025-05-16T00:29:34.674701353Z" level=error msg="encountered an error cleaning up failed sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.674802 env[1215]: time="2025-05-16T00:29:34.674758953Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-sgdm4,Uid:e34e54e0-2fe6-43cf-a937-170d6e7994c7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.675023 kubelet[1969]: E0516 00:29:34.674983 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.675084 kubelet[1969]: E0516 00:29:34.675061 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-sgdm4" May 16 00:29:34.675118 kubelet[1969]: E0516 00:29:34.675082 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-sgdm4" May 16 00:29:34.675144 kubelet[1969]: E0516 00:29:34.675120 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-sgdm4_kube-system(e34e54e0-2fe6-43cf-a937-170d6e7994c7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-sgdm4_kube-system(e34e54e0-2fe6-43cf-a937-170d6e7994c7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-sgdm4" podUID="e34e54e0-2fe6-43cf-a937-170d6e7994c7" May 16 00:29:34.682600 env[1215]: time="2025-05-16T00:29:34.682541444Z" level=error msg="Failed to destroy network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.683079 env[1215]: time="2025-05-16T00:29:34.683044524Z" level=error msg="encountered an error cleaning up failed sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.683243 env[1215]: time="2025-05-16T00:29:34.683211565Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-2lds8,Uid:703f34ab-0c43-4709-b070-86f2f2f5a842,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.683584 kubelet[1969]: E0516 00:29:34.683542 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.683660 kubelet[1969]: E0516 00:29:34.683605 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64555d77cf-2lds8" May 16 00:29:34.683660 kubelet[1969]: E0516 00:29:34.683652 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64555d77cf-2lds8" May 16 00:29:34.683712 kubelet[1969]: E0516 00:29:34.683689 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-64555d77cf-2lds8_calico-apiserver(703f34ab-0c43-4709-b070-86f2f2f5a842)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-64555d77cf-2lds8_calico-apiserver(703f34ab-0c43-4709-b070-86f2f2f5a842)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64555d77cf-2lds8" podUID="703f34ab-0c43-4709-b070-86f2f2f5a842" May 16 00:29:34.693028 env[1215]: time="2025-05-16T00:29:34.692970018Z" level=error msg="Failed to destroy network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.693399 env[1215]: time="2025-05-16T00:29:34.693360498Z" level=error msg="encountered an error cleaning up failed sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.693477 env[1215]: time="2025-05-16T00:29:34.693415818Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nggsx,Uid:ba00be6e-83e4-4188-a55e-ca7c09f4110b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.693672 kubelet[1969]: E0516 00:29:34.693628 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.693737 kubelet[1969]: E0516 00:29:34.693691 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-nggsx" May 16 00:29:34.693737 kubelet[1969]: E0516 00:29:34.693713 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-nggsx" May 16 00:29:34.693806 kubelet[1969]: E0516 00:29:34.693755 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-nggsx_calico-system(ba00be6e-83e4-4188-a55e-ca7c09f4110b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-nggsx_calico-system(ba00be6e-83e4-4188-a55e-ca7c09f4110b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-nggsx" podUID="ba00be6e-83e4-4188-a55e-ca7c09f4110b" May 16 00:29:34.694846 env[1215]: time="2025-05-16T00:29:34.694797540Z" level=error msg="Failed to destroy network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.695132 env[1215]: time="2025-05-16T00:29:34.695092901Z" level=error msg="encountered an error cleaning up failed sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.695206 env[1215]: time="2025-05-16T00:29:34.695140861Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-5gb65,Uid:9f0bb5f5-a1b1-414f-a68e-79e577cbd224,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.695330 kubelet[1969]: E0516 00:29:34.695297 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.695404 kubelet[1969]: E0516 00:29:34.695346 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64555d77cf-5gb65" May 16 00:29:34.695404 kubelet[1969]: E0516 00:29:34.695365 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-64555d77cf-5gb65" May 16 00:29:34.695463 kubelet[1969]: E0516 00:29:34.695398 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-64555d77cf-5gb65_calico-apiserver(9f0bb5f5-a1b1-414f-a68e-79e577cbd224)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-64555d77cf-5gb65_calico-apiserver(9f0bb5f5-a1b1-414f-a68e-79e577cbd224)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64555d77cf-5gb65" podUID="9f0bb5f5-a1b1-414f-a68e-79e577cbd224" May 16 00:29:34.697965 env[1215]: time="2025-05-16T00:29:34.697916665Z" level=error msg="Failed to destroy network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.698281 env[1215]: time="2025-05-16T00:29:34.698243665Z" level=error msg="encountered an error cleaning up failed sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.698359 env[1215]: time="2025-05-16T00:29:34.698291945Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-757f7fdb6b-td8lz,Uid:65084909-fdb1-447e-937c-06ab02b22440,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.698498 kubelet[1969]: E0516 00:29:34.698459 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.698555 kubelet[1969]: E0516 00:29:34.698505 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-757f7fdb6b-td8lz" May 16 00:29:34.698555 kubelet[1969]: E0516 00:29:34.698522 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-757f7fdb6b-td8lz" May 16 00:29:34.698603 kubelet[1969]: E0516 00:29:34.698553 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-757f7fdb6b-td8lz_calico-system(65084909-fdb1-447e-937c-06ab02b22440)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-757f7fdb6b-td8lz_calico-system(65084909-fdb1-447e-937c-06ab02b22440)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-757f7fdb6b-td8lz" podUID="65084909-fdb1-447e-937c-06ab02b22440" May 16 00:29:34.702319 env[1215]: time="2025-05-16T00:29:34.702269951Z" level=error msg="Failed to destroy network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.702773 env[1215]: time="2025-05-16T00:29:34.702733311Z" level=error msg="encountered an error cleaning up failed sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.702899 env[1215]: time="2025-05-16T00:29:34.702868351Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d955dd94-m7xnx,Uid:a85f3374-0afa-4eca-90fb-15cd72a69095,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.703232 kubelet[1969]: E0516 00:29:34.703192 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.703310 kubelet[1969]: E0516 00:29:34.703240 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-77d955dd94-m7xnx" May 16 00:29:34.703310 kubelet[1969]: E0516 00:29:34.703256 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-77d955dd94-m7xnx" May 16 00:29:34.703310 kubelet[1969]: E0516 00:29:34.703290 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-77d955dd94-m7xnx_calico-system(a85f3374-0afa-4eca-90fb-15cd72a69095)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-77d955dd94-m7xnx_calico-system(a85f3374-0afa-4eca-90fb-15cd72a69095)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-77d955dd94-m7xnx" podUID="a85f3374-0afa-4eca-90fb-15cd72a69095" May 16 00:29:34.710909 env[1215]: time="2025-05-16T00:29:34.710862442Z" level=error msg="Failed to destroy network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.711337 env[1215]: time="2025-05-16T00:29:34.711295003Z" level=error msg="encountered an error cleaning up failed sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.711380 env[1215]: time="2025-05-16T00:29:34.711360683Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dsghd,Uid:cc5835e5-f189-44ad-9314-f31fbd66b374,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.711559 kubelet[1969]: E0516 00:29:34.711526 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:34.711601 kubelet[1969]: E0516 00:29:34.711576 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-dsghd" May 16 00:29:34.711601 kubelet[1969]: E0516 00:29:34.711594 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-668d6bf9bc-dsghd" May 16 00:29:34.711646 kubelet[1969]: E0516 00:29:34.711626 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-668d6bf9bc-dsghd_kube-system(cc5835e5-f189-44ad-9314-f31fbd66b374)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-668d6bf9bc-dsghd_kube-system(cc5835e5-f189-44ad-9314-f31fbd66b374)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-dsghd" podUID="cc5835e5-f189-44ad-9314-f31fbd66b374" May 16 00:29:34.998107 kubelet[1969]: I0516 00:29:34.997427 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:29:34.998445 env[1215]: time="2025-05-16T00:29:34.998240874Z" level=info msg="StopPodSandbox for \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\"" May 16 00:29:35.000901 kubelet[1969]: I0516 00:29:35.000546 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:29:35.001009 env[1215]: time="2025-05-16T00:29:35.000965918Z" level=info msg="StopPodSandbox for \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\"" May 16 00:29:35.002434 kubelet[1969]: I0516 00:29:35.002201 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:29:35.002811 env[1215]: time="2025-05-16T00:29:35.002781760Z" level=info msg="StopPodSandbox for \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\"" May 16 00:29:35.004095 kubelet[1969]: I0516 00:29:35.003805 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:29:35.004362 env[1215]: time="2025-05-16T00:29:35.004322162Z" level=info msg="StopPodSandbox for \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\"" May 16 00:29:35.009069 kubelet[1969]: I0516 00:29:35.008792 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:29:35.009325 env[1215]: time="2025-05-16T00:29:35.009296609Z" level=info msg="StopPodSandbox for \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\"" May 16 00:29:35.011024 env[1215]: time="2025-05-16T00:29:35.010987731Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 16 00:29:35.014461 kubelet[1969]: I0516 00:29:35.014307 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:29:35.021479 env[1215]: time="2025-05-16T00:29:35.018548421Z" level=info msg="StopPodSandbox for \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\"" May 16 00:29:35.021794 kubelet[1969]: I0516 00:29:35.021768 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:29:35.022446 env[1215]: time="2025-05-16T00:29:35.022356065Z" level=info msg="StopPodSandbox for \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\"" May 16 00:29:35.037935 env[1215]: time="2025-05-16T00:29:35.037867445Z" level=error msg="StopPodSandbox for \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\" failed" error="failed to destroy network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:35.038417 kubelet[1969]: E0516 00:29:35.038377 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:29:35.039870 kubelet[1969]: E0516 00:29:35.039794 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e"} May 16 00:29:35.039946 kubelet[1969]: E0516 00:29:35.039883 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65084909-fdb1-447e-937c-06ab02b22440\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:35.039946 kubelet[1969]: E0516 00:29:35.039906 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65084909-fdb1-447e-937c-06ab02b22440\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-757f7fdb6b-td8lz" podUID="65084909-fdb1-447e-937c-06ab02b22440" May 16 00:29:35.045403 env[1215]: time="2025-05-16T00:29:35.045342695Z" level=error msg="StopPodSandbox for \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\" failed" error="failed to destroy network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:35.045636 kubelet[1969]: E0516 00:29:35.045596 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:29:35.045689 kubelet[1969]: E0516 00:29:35.045644 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62"} May 16 00:29:35.045726 kubelet[1969]: E0516 00:29:35.045694 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e34e54e0-2fe6-43cf-a937-170d6e7994c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:35.045726 kubelet[1969]: E0516 00:29:35.045715 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e34e54e0-2fe6-43cf-a937-170d6e7994c7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-sgdm4" podUID="e34e54e0-2fe6-43cf-a937-170d6e7994c7" May 16 00:29:35.058673 env[1215]: time="2025-05-16T00:29:35.058601512Z" level=error msg="StopPodSandbox for \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\" failed" error="failed to destroy network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:35.058949 kubelet[1969]: E0516 00:29:35.058905 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:29:35.059026 kubelet[1969]: E0516 00:29:35.058958 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3"} May 16 00:29:35.059026 kubelet[1969]: E0516 00:29:35.059000 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"703f34ab-0c43-4709-b070-86f2f2f5a842\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:35.059112 kubelet[1969]: E0516 00:29:35.059020 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"703f34ab-0c43-4709-b070-86f2f2f5a842\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64555d77cf-2lds8" podUID="703f34ab-0c43-4709-b070-86f2f2f5a842" May 16 00:29:35.062951 env[1215]: time="2025-05-16T00:29:35.062905437Z" level=error msg="StopPodSandbox for \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\" failed" error="failed to destroy network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:35.063126 kubelet[1969]: E0516 00:29:35.063096 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:29:35.063200 kubelet[1969]: E0516 00:29:35.063136 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8"} May 16 00:29:35.063200 kubelet[1969]: E0516 00:29:35.063162 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9f0bb5f5-a1b1-414f-a68e-79e577cbd224\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:35.063291 kubelet[1969]: E0516 00:29:35.063197 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9f0bb5f5-a1b1-414f-a68e-79e577cbd224\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-64555d77cf-5gb65" podUID="9f0bb5f5-a1b1-414f-a68e-79e577cbd224" May 16 00:29:35.068604 env[1215]: time="2025-05-16T00:29:35.068554245Z" level=error msg="StopPodSandbox for \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\" failed" error="failed to destroy network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:35.068949 kubelet[1969]: E0516 00:29:35.068907 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:29:35.069032 kubelet[1969]: E0516 00:29:35.068949 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106"} May 16 00:29:35.069032 kubelet[1969]: E0516 00:29:35.068987 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a85f3374-0afa-4eca-90fb-15cd72a69095\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:35.069032 kubelet[1969]: E0516 00:29:35.069005 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a85f3374-0afa-4eca-90fb-15cd72a69095\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-77d955dd94-m7xnx" podUID="a85f3374-0afa-4eca-90fb-15cd72a69095" May 16 00:29:35.074340 env[1215]: time="2025-05-16T00:29:35.074287252Z" level=error msg="StopPodSandbox for \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\" failed" error="failed to destroy network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:35.074695 kubelet[1969]: E0516 00:29:35.074645 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:29:35.074763 kubelet[1969]: E0516 00:29:35.074702 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09"} May 16 00:29:35.074791 kubelet[1969]: E0516 00:29:35.074756 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ba00be6e-83e4-4188-a55e-ca7c09f4110b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:35.074838 kubelet[1969]: E0516 00:29:35.074792 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ba00be6e-83e4-4188-a55e-ca7c09f4110b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-nggsx" podUID="ba00be6e-83e4-4188-a55e-ca7c09f4110b" May 16 00:29:35.086935 env[1215]: time="2025-05-16T00:29:35.086885348Z" level=error msg="StopPodSandbox for \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\" failed" error="failed to destroy network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:35.087348 kubelet[1969]: E0516 00:29:35.087287 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:29:35.087425 kubelet[1969]: E0516 00:29:35.087351 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752"} May 16 00:29:35.087425 kubelet[1969]: E0516 00:29:35.087383 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc5835e5-f189-44ad-9314-f31fbd66b374\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:35.087425 kubelet[1969]: E0516 00:29:35.087408 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc5835e5-f189-44ad-9314-f31fbd66b374\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-668d6bf9bc-dsghd" podUID="cc5835e5-f189-44ad-9314-f31fbd66b374" May 16 00:29:35.274746 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3-shm.mount: Deactivated successfully. May 16 00:29:35.274832 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106-shm.mount: Deactivated successfully. May 16 00:29:35.274879 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62-shm.mount: Deactivated successfully. May 16 00:29:35.274928 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752-shm.mount: Deactivated successfully. May 16 00:29:35.933943 systemd[1]: Created slice kubepods-besteffort-podc3fcf332_4196_4b8e_81cc_4698dfec5b10.slice. May 16 00:29:35.936843 env[1215]: time="2025-05-16T00:29:35.936802755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dr4tx,Uid:c3fcf332-4196-4b8e-81cc-4698dfec5b10,Namespace:calico-system,Attempt:0,}" May 16 00:29:36.102621 env[1215]: time="2025-05-16T00:29:36.102563199Z" level=error msg="Failed to destroy network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:36.105339 env[1215]: time="2025-05-16T00:29:36.102900680Z" level=error msg="encountered an error cleaning up failed sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:36.105339 env[1215]: time="2025-05-16T00:29:36.102946080Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dr4tx,Uid:c3fcf332-4196-4b8e-81cc-4698dfec5b10,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:36.104510 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571-shm.mount: Deactivated successfully. May 16 00:29:36.105510 kubelet[1969]: E0516 00:29:36.103198 1969 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:36.105510 kubelet[1969]: E0516 00:29:36.103259 1969 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dr4tx" May 16 00:29:36.105510 kubelet[1969]: E0516 00:29:36.103279 1969 kuberuntime_manager.go:1237] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dr4tx" May 16 00:29:36.105783 kubelet[1969]: E0516 00:29:36.103323 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dr4tx_calico-system(c3fcf332-4196-4b8e-81cc-4698dfec5b10)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dr4tx_calico-system(c3fcf332-4196-4b8e-81cc-4698dfec5b10)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dr4tx" podUID="c3fcf332-4196-4b8e-81cc-4698dfec5b10" May 16 00:29:37.027899 kubelet[1969]: I0516 00:29:37.027851 1969 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:29:37.028446 env[1215]: time="2025-05-16T00:29:37.028397628Z" level=info msg="StopPodSandbox for \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\"" May 16 00:29:37.055672 env[1215]: time="2025-05-16T00:29:37.055611138Z" level=error msg="StopPodSandbox for \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\" failed" error="failed to destroy network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:29:37.055922 kubelet[1969]: E0516 00:29:37.055882 1969 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:29:37.055990 kubelet[1969]: E0516 00:29:37.055940 1969 kuberuntime_manager.go:1546] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571"} May 16 00:29:37.055990 kubelet[1969]: E0516 00:29:37.055980 1969 kuberuntime_manager.go:1146] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c3fcf332-4196-4b8e-81cc-4698dfec5b10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:29:37.056072 kubelet[1969]: E0516 00:29:37.056010 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c3fcf332-4196-4b8e-81cc-4698dfec5b10\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dr4tx" podUID="c3fcf332-4196-4b8e-81cc-4698dfec5b10" May 16 00:29:39.381982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2223223294.mount: Deactivated successfully. May 16 00:29:39.516798 env[1215]: time="2025-05-16T00:29:39.516751885Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:39.519273 env[1215]: time="2025-05-16T00:29:39.519233168Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:39.520888 env[1215]: time="2025-05-16T00:29:39.520858049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:39.522386 env[1215]: time="2025-05-16T00:29:39.522358451Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:39.523043 env[1215]: time="2025-05-16T00:29:39.523016411Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 16 00:29:39.537618 env[1215]: time="2025-05-16T00:29:39.537554586Z" level=info msg="CreateContainer within sandbox \"96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 16 00:29:39.552429 env[1215]: time="2025-05-16T00:29:39.552377160Z" level=info msg="CreateContainer within sandbox \"96c5ca6111a03b55f0c3bca6835a5d038752c4e1188f8013ec129be151f731cd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c38fa8bbafeb104f2afdcf0d10cc2e422efaf20f09e3b0260d40a1dbbe8d2187\"" May 16 00:29:39.553091 env[1215]: time="2025-05-16T00:29:39.553062281Z" level=info msg="StartContainer for \"c38fa8bbafeb104f2afdcf0d10cc2e422efaf20f09e3b0260d40a1dbbe8d2187\"" May 16 00:29:39.574025 systemd[1]: Started cri-containerd-c38fa8bbafeb104f2afdcf0d10cc2e422efaf20f09e3b0260d40a1dbbe8d2187.scope. May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616927 kernel: kauditd_printk_skb: 135 callbacks suppressed May 16 00:29:39.616987 kernel: audit: type=1400 audit(1747355379.613:1010): avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.617013 kernel: audit: type=1300 audit(1747355379.613:1010): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2437 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:39.613000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2437 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:39.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333386661386262616665623130346632616664636630643130636332 May 16 00:29:39.621806 kernel: audit: type=1327 audit(1747355379.613:1010): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333386661386262616665623130346632616664636630643130636332 May 16 00:29:39.621855 kernel: audit: type=1400 audit(1747355379.613:1011): avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.623520 kernel: audit: type=1400 audit(1747355379.613:1011): avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.627089 kernel: audit: type=1400 audit(1747355379.613:1011): avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.627130 kernel: audit: type=1400 audit(1747355379.613:1011): avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.634098 kernel: audit: type=1400 audit(1747355379.613:1011): avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.634197 kernel: audit: type=1400 audit(1747355379.613:1011): avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.636951 kernel: audit: type=1400 audit(1747355379.613:1011): avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit: BPF prog-id=133 op=LOAD May 16 00:29:39.613000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2437 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:39.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333386661386262616665623130346632616664636630643130636332 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.613000 audit: BPF prog-id=134 op=LOAD May 16 00:29:39.613000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2437 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:39.613000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333386661386262616665623130346632616664636630643130636332 May 16 00:29:39.616000 audit: BPF prog-id=134 op=UNLOAD May 16 00:29:39.616000 audit: BPF prog-id=133 op=UNLOAD May 16 00:29:39.616000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { perfmon } for pid=3178 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit[3178]: AVC avc: denied { bpf } for pid=3178 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:39.616000 audit: BPF prog-id=135 op=LOAD May 16 00:29:39.616000 audit[3178]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2437 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:39.616000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333386661386262616665623130346632616664636630643130636332 May 16 00:29:39.640854 env[1215]: time="2025-05-16T00:29:39.640811768Z" level=info msg="StartContainer for \"c38fa8bbafeb104f2afdcf0d10cc2e422efaf20f09e3b0260d40a1dbbe8d2187\" returns successfully" May 16 00:29:39.911194 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 16 00:29:39.911346 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 16 00:29:40.011942 env[1215]: time="2025-05-16T00:29:40.011885734Z" level=info msg="StopPodSandbox for \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\"" May 16 00:29:40.053373 kubelet[1969]: I0516 00:29:40.052637 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-j5flv" podStartSLOduration=1.070792075 podStartE2EDuration="12.052621491s" podCreationTimestamp="2025-05-16 00:29:28 +0000 UTC" firstStartedPulling="2025-05-16 00:29:28.542542677 +0000 UTC m=+18.696551378" lastFinishedPulling="2025-05-16 00:29:39.524372093 +0000 UTC m=+29.678380794" observedRunningTime="2025-05-16 00:29:40.051836971 +0000 UTC m=+30.205845752" watchObservedRunningTime="2025-05-16 00:29:40.052621491 +0000 UTC m=+30.206630232" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.158 [INFO][3228] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.158 [INFO][3228] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" iface="eth0" netns="/var/run/netns/cni-e7b56e8f-c6be-f30c-97cb-452ff9f8e44c" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.159 [INFO][3228] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" iface="eth0" netns="/var/run/netns/cni-e7b56e8f-c6be-f30c-97cb-452ff9f8e44c" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.160 [INFO][3228] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" iface="eth0" netns="/var/run/netns/cni-e7b56e8f-c6be-f30c-97cb-452ff9f8e44c" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.160 [INFO][3228] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.160 [INFO][3228] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.266 [INFO][3264] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.266 [INFO][3264] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.266 [INFO][3264] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.284 [WARNING][3264] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.284 [INFO][3264] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.286 [INFO][3264] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:40.295197 env[1215]: 2025-05-16 00:29:40.289 [INFO][3228] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:29:40.295625 env[1215]: time="2025-05-16T00:29:40.295454076Z" level=info msg="TearDown network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\" successfully" May 16 00:29:40.295625 env[1215]: time="2025-05-16T00:29:40.295486677Z" level=info msg="StopPodSandbox for \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\" returns successfully" May 16 00:29:40.352911 kubelet[1969]: I0516 00:29:40.352798 1969 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/65084909-fdb1-447e-937c-06ab02b22440-whisker-backend-key-pair\") pod \"65084909-fdb1-447e-937c-06ab02b22440\" (UID: \"65084909-fdb1-447e-937c-06ab02b22440\") " May 16 00:29:40.352911 kubelet[1969]: I0516 00:29:40.352844 1969 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8xkhv\" (UniqueName: \"kubernetes.io/projected/65084909-fdb1-447e-937c-06ab02b22440-kube-api-access-8xkhv\") pod \"65084909-fdb1-447e-937c-06ab02b22440\" (UID: \"65084909-fdb1-447e-937c-06ab02b22440\") " May 16 00:29:40.352911 kubelet[1969]: I0516 00:29:40.352875 1969 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/65084909-fdb1-447e-937c-06ab02b22440-whisker-ca-bundle\") pod \"65084909-fdb1-447e-937c-06ab02b22440\" (UID: \"65084909-fdb1-447e-937c-06ab02b22440\") " May 16 00:29:40.356764 kubelet[1969]: I0516 00:29:40.356716 1969 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/65084909-fdb1-447e-937c-06ab02b22440-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "65084909-fdb1-447e-937c-06ab02b22440" (UID: "65084909-fdb1-447e-937c-06ab02b22440"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 16 00:29:40.357871 kubelet[1969]: I0516 00:29:40.357835 1969 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/65084909-fdb1-447e-937c-06ab02b22440-kube-api-access-8xkhv" (OuterVolumeSpecName: "kube-api-access-8xkhv") pod "65084909-fdb1-447e-937c-06ab02b22440" (UID: "65084909-fdb1-447e-937c-06ab02b22440"). InnerVolumeSpecName "kube-api-access-8xkhv". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 16 00:29:40.359785 kubelet[1969]: I0516 00:29:40.359740 1969 operation_generator.go:780] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/65084909-fdb1-447e-937c-06ab02b22440-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "65084909-fdb1-447e-937c-06ab02b22440" (UID: "65084909-fdb1-447e-937c-06ab02b22440"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 16 00:29:40.382996 systemd[1]: run-netns-cni\x2de7b56e8f\x2dc6be\x2df30c\x2d97cb\x2d452ff9f8e44c.mount: Deactivated successfully. May 16 00:29:40.383124 systemd[1]: var-lib-kubelet-pods-65084909\x2dfdb1\x2d447e\x2d937c\x2d06ab02b22440-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8xkhv.mount: Deactivated successfully. May 16 00:29:40.383199 systemd[1]: var-lib-kubelet-pods-65084909\x2dfdb1\x2d447e\x2d937c\x2d06ab02b22440-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 16 00:29:40.454081 kubelet[1969]: I0516 00:29:40.454042 1969 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-8xkhv\" (UniqueName: \"kubernetes.io/projected/65084909-fdb1-447e-937c-06ab02b22440-kube-api-access-8xkhv\") on node \"localhost\" DevicePath \"\"" May 16 00:29:40.454081 kubelet[1969]: I0516 00:29:40.454077 1969 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/65084909-fdb1-447e-937c-06ab02b22440-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 16 00:29:40.454081 kubelet[1969]: I0516 00:29:40.454087 1969 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/65084909-fdb1-447e-937c-06ab02b22440-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 16 00:29:41.044240 systemd[1]: Removed slice kubepods-besteffort-pod65084909_fdb1_447e_937c_06ab02b22440.slice. May 16 00:29:41.111987 systemd[1]: Created slice kubepods-besteffort-podfef8e377_d219_4f66_8658_d7c66547a7b5.slice. May 16 00:29:41.158382 kubelet[1969]: I0516 00:29:41.158341 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/fef8e377-d219-4f66-8658-d7c66547a7b5-whisker-backend-key-pair\") pod \"whisker-6d4674dbd4-g86bc\" (UID: \"fef8e377-d219-4f66-8658-d7c66547a7b5\") " pod="calico-system/whisker-6d4674dbd4-g86bc" May 16 00:29:41.158382 kubelet[1969]: I0516 00:29:41.158386 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-87sdd\" (UniqueName: \"kubernetes.io/projected/fef8e377-d219-4f66-8658-d7c66547a7b5-kube-api-access-87sdd\") pod \"whisker-6d4674dbd4-g86bc\" (UID: \"fef8e377-d219-4f66-8658-d7c66547a7b5\") " pod="calico-system/whisker-6d4674dbd4-g86bc" May 16 00:29:41.158740 kubelet[1969]: I0516 00:29:41.158410 1969 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fef8e377-d219-4f66-8658-d7c66547a7b5-whisker-ca-bundle\") pod \"whisker-6d4674dbd4-g86bc\" (UID: \"fef8e377-d219-4f66-8658-d7c66547a7b5\") " pod="calico-system/whisker-6d4674dbd4-g86bc" May 16 00:29:41.363000 audit[3365]: AVC avc: denied { write } for pid=3365 comm="tee" name="fd" dev="proc" ino=20756 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:29:41.363000 audit[3365]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0f297d5 a2=241 a3=1b6 items=1 ppid=3319 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.363000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 16 00:29:41.363000 audit: PATH item=0 name="/dev/fd/63" inode=18086 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:29:41.363000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:29:41.390000 audit[3384]: AVC avc: denied { write } for pid=3384 comm="tee" name="fd" dev="proc" ino=18093 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:29:41.390000 audit[3384]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5afa7d6 a2=241 a3=1b6 items=1 ppid=3333 pid=3384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.390000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 16 00:29:41.390000 audit: PATH item=0 name="/dev/fd/63" inode=18966 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:29:41.390000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:29:41.396000 audit[3386]: AVC avc: denied { write } for pid=3386 comm="tee" name="fd" dev="proc" ino=20771 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:29:41.396000 audit[3386]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd9b7b7e5 a2=241 a3=1b6 items=1 ppid=3321 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.396000 audit: CWD cwd="/etc/service/enabled/confd/log" May 16 00:29:41.396000 audit: PATH item=0 name="/dev/fd/63" inode=18967 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:29:41.396000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:29:41.398000 audit[3390]: AVC avc: denied { write } for pid=3390 comm="tee" name="fd" dev="proc" ino=18100 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:29:41.398000 audit[3390]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe19fd7e5 a2=241 a3=1b6 items=1 ppid=3322 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.398000 audit: CWD cwd="/etc/service/enabled/felix/log" May 16 00:29:41.398000 audit[3388]: AVC avc: denied { write } for pid=3388 comm="tee" name="fd" dev="proc" ino=18102 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:29:41.398000 audit[3388]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0ca07e6 a2=241 a3=1b6 items=1 ppid=3320 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.398000 audit: CWD cwd="/etc/service/enabled/bird/log" May 16 00:29:41.398000 audit: PATH item=0 name="/dev/fd/63" inode=20766 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:29:41.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:29:41.398000 audit: PATH item=0 name="/dev/fd/63" inode=20767 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:29:41.398000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:29:41.402000 audit[3396]: AVC avc: denied { write } for pid=3396 comm="tee" name="fd" dev="proc" ino=18106 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:29:41.402000 audit[3396]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd41237e7 a2=241 a3=1b6 items=1 ppid=3326 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.402000 audit: CWD cwd="/etc/service/enabled/cni/log" May 16 00:29:41.402000 audit: PATH item=0 name="/dev/fd/63" inode=20768 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:29:41.402000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:29:41.414815 env[1215]: time="2025-05-16T00:29:41.414767770Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6d4674dbd4-g86bc,Uid:fef8e377-d219-4f66-8658-d7c66547a7b5,Namespace:calico-system,Attempt:0,}" May 16 00:29:41.439000 audit[3402]: AVC avc: denied { write } for pid=3402 comm="tee" name="fd" dev="proc" ino=18975 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:29:41.439000 audit[3402]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff4daa7e5 a2=241 a3=1b6 items=1 ppid=3334 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.439000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 16 00:29:41.439000 audit: PATH item=0 name="/dev/fd/63" inode=20775 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:29:41.439000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:29:41.594036 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:29:41.594246 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali870a461537e: link becomes ready May 16 00:29:41.593133 systemd-networkd[1043]: cali870a461537e: Link UP May 16 00:29:41.593392 systemd-networkd[1043]: cali870a461537e: Gained carrier May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.482 [INFO][3408] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.504 [INFO][3408] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--6d4674dbd4--g86bc-eth0 whisker-6d4674dbd4- calico-system fef8e377-d219-4f66-8658-d7c66547a7b5 887 0 2025-05-16 00:29:41 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:6d4674dbd4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-6d4674dbd4-g86bc eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali870a461537e [] [] }} ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.504 [INFO][3408] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.541 [INFO][3426] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" HandleID="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Workload="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.541 [INFO][3426] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" HandleID="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Workload="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000137660), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-6d4674dbd4-g86bc", "timestamp":"2025-05-16 00:29:41.541227639 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.541 [INFO][3426] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.541 [INFO][3426] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.541 [INFO][3426] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.551 [INFO][3426] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.560 [INFO][3426] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.564 [INFO][3426] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.566 [INFO][3426] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.568 [INFO][3426] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.568 [INFO][3426] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.569 [INFO][3426] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494 May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.573 [INFO][3426] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.577 [INFO][3426] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.577 [INFO][3426] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" host="localhost" May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.577 [INFO][3426] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:41.608541 env[1215]: 2025-05-16 00:29:41.577 [INFO][3426] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" HandleID="k8s-pod-network.6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Workload="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" May 16 00:29:41.609396 env[1215]: 2025-05-16 00:29:41.579 [INFO][3408] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--6d4674dbd4--g86bc-eth0", GenerateName:"whisker-6d4674dbd4-", Namespace:"calico-system", SelfLink:"", UID:"fef8e377-d219-4f66-8658-d7c66547a7b5", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6d4674dbd4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-6d4674dbd4-g86bc", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali870a461537e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:41.609396 env[1215]: 2025-05-16 00:29:41.579 [INFO][3408] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" May 16 00:29:41.609396 env[1215]: 2025-05-16 00:29:41.579 [INFO][3408] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali870a461537e ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" May 16 00:29:41.609396 env[1215]: 2025-05-16 00:29:41.594 [INFO][3408] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" May 16 00:29:41.609396 env[1215]: 2025-05-16 00:29:41.594 [INFO][3408] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--6d4674dbd4--g86bc-eth0", GenerateName:"whisker-6d4674dbd4-", Namespace:"calico-system", SelfLink:"", UID:"fef8e377-d219-4f66-8658-d7c66547a7b5", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 41, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6d4674dbd4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494", Pod:"whisker-6d4674dbd4-g86bc", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali870a461537e", MAC:"8a:db:51:ae:71:d5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:41.609396 env[1215]: 2025-05-16 00:29:41.605 [INFO][3408] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494" Namespace="calico-system" Pod="whisker-6d4674dbd4-g86bc" WorkloadEndpoint="localhost-k8s-whisker--6d4674dbd4--g86bc-eth0" May 16 00:29:41.617994 env[1215]: time="2025-05-16T00:29:41.617851906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:41.617994 env[1215]: time="2025-05-16T00:29:41.617906706Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:41.617994 env[1215]: time="2025-05-16T00:29:41.617917266Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:41.618285 env[1215]: time="2025-05-16T00:29:41.618070146Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494 pid=3450 runtime=io.containerd.runc.v2 May 16 00:29:41.633861 systemd[1]: Started cri-containerd-6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494.scope. May 16 00:29:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit: BPF prog-id=136 op=LOAD May 16 00:29:41.688000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.688000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3450 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383865636665653034356165663264386630613761333730636663 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3450 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383865636665653034356165663264386630613761333730636663 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit: BPF prog-id=137 op=LOAD May 16 00:29:41.689000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3450 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383865636665653034356165663264386630613761333730636663 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit: BPF prog-id=138 op=LOAD May 16 00:29:41.689000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3450 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383865636665653034356165663264386630613761333730636663 May 16 00:29:41.689000 audit: BPF prog-id=138 op=UNLOAD May 16 00:29:41.689000 audit: BPF prog-id=137 op=UNLOAD May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { perfmon } for pid=3459 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit[3459]: AVC avc: denied { bpf } for pid=3459 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:41.689000 audit: BPF prog-id=139 op=LOAD May 16 00:29:41.689000 audit[3459]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3450 pid=3459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:41.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639383865636665653034356165663264386630613761333730636663 May 16 00:29:41.690951 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:41.708796 env[1215]: time="2025-05-16T00:29:41.708746945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6d4674dbd4-g86bc,Uid:fef8e377-d219-4f66-8658-d7c66547a7b5,Namespace:calico-system,Attempt:0,} returns sandbox id \"6988ecfee045aef2d8f0a7a370cfcdf0d9361ac9760e27b560493b7c241ba494\"" May 16 00:29:41.711403 env[1215]: time="2025-05-16T00:29:41.710399946Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:29:41.849345 env[1215]: time="2025-05-16T00:29:41.849277787Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:29:41.850102 env[1215]: time="2025-05-16T00:29:41.850064668Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:29:41.850752 kubelet[1969]: E0516 00:29:41.850316 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:29:41.850752 kubelet[1969]: E0516 00:29:41.850385 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:29:41.851036 kubelet[1969]: E0516 00:29:41.850703 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:82d6f6c415eb4a05980056a4429f1c21,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-87sdd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6d4674dbd4-g86bc_calico-system(fef8e377-d219-4f66-8658-d7c66547a7b5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:29:41.852621 env[1215]: time="2025-05-16T00:29:41.852594070Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:29:41.929890 kubelet[1969]: I0516 00:29:41.929644 1969 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="65084909-fdb1-447e-937c-06ab02b22440" path="/var/lib/kubelet/pods/65084909-fdb1-447e-937c-06ab02b22440/volumes" May 16 00:29:42.029466 env[1215]: time="2025-05-16T00:29:42.029391182Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:29:42.030228 env[1215]: time="2025-05-16T00:29:42.030186663Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:29:42.030461 kubelet[1969]: E0516 00:29:42.030417 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:29:42.030524 kubelet[1969]: E0516 00:29:42.030466 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:29:42.030862 kubelet[1969]: E0516 00:29:42.030591 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-87sdd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6d4674dbd4-g86bc_calico-system(fef8e377-d219-4f66-8658-d7c66547a7b5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:29:42.032181 kubelet[1969]: E0516 00:29:42.032034 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6d4674dbd4-g86bc" podUID="fef8e377-d219-4f66-8658-d7c66547a7b5" May 16 00:29:42.045116 kubelet[1969]: E0516 00:29:42.045065 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6d4674dbd4-g86bc" podUID="fef8e377-d219-4f66-8658-d7c66547a7b5" May 16 00:29:42.102000 audit[3502]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=3502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:42.102000 audit[3502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffd0323d50 a2=0 a3=1 items=0 ppid=2082 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:42.102000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:42.109000 audit[3502]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:42.109000 audit[3502]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd0323d50 a2=0 a3=1 items=0 ppid=2082 pid=3502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:42.109000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:43.049261 kubelet[1969]: E0516 00:29:43.049217 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6d4674dbd4-g86bc" podUID="fef8e377-d219-4f66-8658-d7c66547a7b5" May 16 00:29:43.610574 systemd-networkd[1043]: cali870a461537e: Gained IPv6LL May 16 00:29:46.927183 env[1215]: time="2025-05-16T00:29:46.926856666Z" level=info msg="StopPodSandbox for \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\"" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.972 [INFO][3643] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.973 [INFO][3643] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" iface="eth0" netns="/var/run/netns/cni-d4a5dc2e-1f39-b4f9-9fd4-4eb65550e9fd" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.973 [INFO][3643] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" iface="eth0" netns="/var/run/netns/cni-d4a5dc2e-1f39-b4f9-9fd4-4eb65550e9fd" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.973 [INFO][3643] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" iface="eth0" netns="/var/run/netns/cni-d4a5dc2e-1f39-b4f9-9fd4-4eb65550e9fd" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.973 [INFO][3643] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.973 [INFO][3643] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.991 [INFO][3652] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.992 [INFO][3652] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:46.992 [INFO][3652] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:47.004 [WARNING][3652] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:47.004 [INFO][3652] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:47.005 [INFO][3652] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:47.014968 env[1215]: 2025-05-16 00:29:47.010 [INFO][3643] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:29:47.016751 env[1215]: time="2025-05-16T00:29:47.016699082Z" level=info msg="TearDown network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\" successfully" May 16 00:29:47.016830 env[1215]: time="2025-05-16T00:29:47.016814202Z" level=info msg="StopPodSandbox for \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\" returns successfully" May 16 00:29:47.017569 systemd[1]: run-netns-cni\x2dd4a5dc2e\x2d1f39\x2db4f9\x2d9fd4\x2d4eb65550e9fd.mount: Deactivated successfully. May 16 00:29:47.018758 env[1215]: time="2025-05-16T00:29:47.018721243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d955dd94-m7xnx,Uid:a85f3374-0afa-4eca-90fb-15cd72a69095,Namespace:calico-system,Attempt:1,}" May 16 00:29:47.154745 systemd-networkd[1043]: cali0b3e4527d92: Link UP May 16 00:29:47.156576 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:29:47.156696 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0b3e4527d92: link becomes ready May 16 00:29:47.156620 systemd-networkd[1043]: cali0b3e4527d92: Gained carrier May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.059 [INFO][3661] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.074 [INFO][3661] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0 calico-kube-controllers-77d955dd94- calico-system a85f3374-0afa-4eca-90fb-15cd72a69095 926 0 2025-05-16 00:29:28 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:77d955dd94 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-77d955dd94-m7xnx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali0b3e4527d92 [] [] }} ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.074 [INFO][3661] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.099 [INFO][3675] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" HandleID="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.099 [INFO][3675] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" HandleID="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000137780), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-77d955dd94-m7xnx", "timestamp":"2025-05-16 00:29:47.09947653 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.099 [INFO][3675] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.099 [INFO][3675] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.099 [INFO][3675] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.112 [INFO][3675] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.118 [INFO][3675] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.123 [INFO][3675] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.126 [INFO][3675] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.129 [INFO][3675] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.129 [INFO][3675] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.131 [INFO][3675] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8 May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.137 [INFO][3675] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.150 [INFO][3675] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.150 [INFO][3675] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" host="localhost" May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.150 [INFO][3675] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:47.178185 env[1215]: 2025-05-16 00:29:47.150 [INFO][3675] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" HandleID="k8s-pod-network.b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.181089 env[1215]: 2025-05-16 00:29:47.152 [INFO][3661] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0", GenerateName:"calico-kube-controllers-77d955dd94-", Namespace:"calico-system", SelfLink:"", UID:"a85f3374-0afa-4eca-90fb-15cd72a69095", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d955dd94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-77d955dd94-m7xnx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0b3e4527d92", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:47.181089 env[1215]: 2025-05-16 00:29:47.152 [INFO][3661] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.181089 env[1215]: 2025-05-16 00:29:47.152 [INFO][3661] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0b3e4527d92 ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.181089 env[1215]: 2025-05-16 00:29:47.156 [INFO][3661] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.181089 env[1215]: 2025-05-16 00:29:47.158 [INFO][3661] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0", GenerateName:"calico-kube-controllers-77d955dd94-", Namespace:"calico-system", SelfLink:"", UID:"a85f3374-0afa-4eca-90fb-15cd72a69095", ResourceVersion:"926", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d955dd94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8", Pod:"calico-kube-controllers-77d955dd94-m7xnx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0b3e4527d92", MAC:"3a:88:cd:15:ec:e7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:47.181089 env[1215]: 2025-05-16 00:29:47.176 [INFO][3661] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8" Namespace="calico-system" Pod="calico-kube-controllers-77d955dd94-m7xnx" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:29:47.188608 env[1215]: time="2025-05-16T00:29:47.188538383Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:47.188788 env[1215]: time="2025-05-16T00:29:47.188762303Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:47.188893 env[1215]: time="2025-05-16T00:29:47.188872263Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:47.189284 env[1215]: time="2025-05-16T00:29:47.189226983Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8 pid=3697 runtime=io.containerd.runc.v2 May 16 00:29:47.212345 systemd[1]: Started cri-containerd-b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8.scope. May 16 00:29:47.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.245541 kernel: kauditd_printk_skb: 131 callbacks suppressed May 16 00:29:47.245596 kernel: audit: type=1400 audit(1747355387.243:1043): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.249283 kernel: audit: type=1400 audit(1747355387.243:1044): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.249383 kernel: audit: type=1400 audit(1747355387.243:1045): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251075 kernel: audit: type=1400 audit(1747355387.243:1046): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.255015 kernel: audit: type=1400 audit(1747355387.243:1047): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.255124 kernel: audit: type=1400 audit(1747355387.243:1048): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.258979 kernel: audit: type=1400 audit(1747355387.243:1049): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.259053 kernel: audit: type=1400 audit(1747355387.243:1050): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.259065 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:47.261008 kernel: audit: type=1400 audit(1747355387.243:1051): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.262911 kernel: audit: type=1400 audit(1747355387.244:1052): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.244000 audit: BPF prog-id=140 op=LOAD May 16 00:29:47.248000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3697 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363064616162356431663263393939656234363832643136353631 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3697 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363064616162356431663263393939656234363832643136353631 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.248000 audit: BPF prog-id=141 op=LOAD May 16 00:29:47.248000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3697 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.248000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363064616162356431663263393939656234363832643136353631 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.250000 audit: BPF prog-id=142 op=LOAD May 16 00:29:47.250000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3697 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.250000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363064616162356431663263393939656234363832643136353631 May 16 00:29:47.251000 audit: BPF prog-id=142 op=UNLOAD May 16 00:29:47.251000 audit: BPF prog-id=141 op=UNLOAD May 16 00:29:47.251000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.251000 audit: BPF prog-id=143 op=LOAD May 16 00:29:47.251000 audit[3705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3697 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6235363064616162356431663263393939656234363832643136353631 May 16 00:29:47.283468 env[1215]: time="2025-05-16T00:29:47.283422079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77d955dd94-m7xnx,Uid:a85f3374-0afa-4eca-90fb-15cd72a69095,Namespace:calico-system,Attempt:1,} returns sandbox id \"b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8\"" May 16 00:29:47.285274 env[1215]: time="2025-05-16T00:29:47.285230840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 16 00:29:47.499752 kubelet[1969]: I0516 00:29:47.499496 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:29:47.500390 kubelet[1969]: E0516 00:29:47.499877 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:47.685000 audit[3734]: NETFILTER_CFG table=filter:101 family=2 entries=21 op=nft_register_rule pid=3734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:47.685000 audit[3734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffc7040b70 a2=0 a3=1 items=0 ppid=2082 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:47.691000 audit[3734]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3734 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:47.691000 audit[3734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc7040b70 a2=0 a3=1 items=0 ppid=2082 pid=3734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.850000 audit: BPF prog-id=144 op=LOAD May 16 00:29:47.850000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd114d848 a2=98 a3=ffffd114d838 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.850000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:47.850000 audit: BPF prog-id=144 op=UNLOAD May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit: BPF prog-id=145 op=LOAD May 16 00:29:47.851000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd114d4d8 a2=74 a3=95 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.851000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:47.851000 audit: BPF prog-id=145 op=UNLOAD May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:47.851000 audit: BPF prog-id=146 op=LOAD May 16 00:29:47.851000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd114d538 a2=94 a3=2 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:47.851000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:47.851000 audit: BPF prog-id=146 op=UNLOAD May 16 00:29:47.927980 env[1215]: time="2025-05-16T00:29:47.927932019Z" level=info msg="StopPodSandbox for \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\"" May 16 00:29:47.930281 env[1215]: time="2025-05-16T00:29:47.930227020Z" level=info msg="StopPodSandbox for \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\"" May 16 00:29:47.930609 env[1215]: time="2025-05-16T00:29:47.930575700Z" level=info msg="StopPodSandbox for \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\"" May 16 00:29:48.018156 systemd[1]: run-containerd-runc-k8s.io-b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8-runc.CX6c2j.mount: Deactivated successfully. May 16 00:29:48.017000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.017000 audit: BPF prog-id=147 op=LOAD May 16 00:29:48.017000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd114d4f8 a2=40 a3=ffffd114d528 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.017000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.018000 audit: BPF prog-id=147 op=UNLOAD May 16 00:29:48.018000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.018000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd114d610 a2=50 a3=0 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.018000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.037000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.037000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd114d568 a2=28 a3=ffffd114d698 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd114d598 a2=28 a3=ffffd114d6c8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd114d448 a2=28 a3=ffffd114d578 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd114d5b8 a2=28 a3=ffffd114d6e8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd114d598 a2=28 a3=ffffd114d6c8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd114d588 a2=28 a3=ffffd114d6b8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd114d5b8 a2=28 a3=ffffd114d6e8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd114d598 a2=28 a3=ffffd114d6c8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd114d5b8 a2=28 a3=ffffd114d6e8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd114d588 a2=28 a3=ffffd114d6b8 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd114d608 a2=28 a3=ffffd114d748 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd114d340 a2=50 a3=0 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit: BPF prog-id=148 op=LOAD May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd114d348 a2=94 a3=5 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit: BPF prog-id=148 op=UNLOAD May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd114d450 a2=50 a3=0 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd114d598 a2=4 a3=3 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { confidentiality } for pid=3760 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd114d578 a2=94 a3=6 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.042000 audit[3760]: AVC avc: denied { confidentiality } for pid=3760 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:29:48.042000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd114cd48 a2=94 a3=83 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.042000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.043000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.043000 audit[3760]: AVC avc: denied { confidentiality } for pid=3760 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:29:48.043000 audit[3760]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd114cd48 a2=94 a3=83 items=0 ppid=3735 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.043000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:29:48.059690 kubelet[1969]: E0516 00:29:48.059646 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit: BPF prog-id=149 op=LOAD May 16 00:29:48.068000 audit[3843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0f174d8 a2=98 a3=ffffd0f174c8 items=0 ppid=3735 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.068000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:29:48.068000 audit: BPF prog-id=149 op=UNLOAD May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit: BPF prog-id=150 op=LOAD May 16 00:29:48.068000 audit[3843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0f17388 a2=74 a3=95 items=0 ppid=3735 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.068000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:29:48.068000 audit: BPF prog-id=150 op=UNLOAD May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { perfmon } for pid=3843 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit[3843]: AVC avc: denied { bpf } for pid=3843 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.068000 audit: BPF prog-id=151 op=LOAD May 16 00:29:48.068000 audit[3843]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd0f173b8 a2=40 a3=ffffd0f173e8 items=0 ppid=3735 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.068000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:29:48.068000 audit: BPF prog-id=151 op=UNLOAD May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.048 [INFO][3798] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.049 [INFO][3798] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" iface="eth0" netns="/var/run/netns/cni-012dab98-0d6d-c082-ba5d-bc28c92acfeb" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.049 [INFO][3798] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" iface="eth0" netns="/var/run/netns/cni-012dab98-0d6d-c082-ba5d-bc28c92acfeb" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.055 [INFO][3798] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" iface="eth0" netns="/var/run/netns/cni-012dab98-0d6d-c082-ba5d-bc28c92acfeb" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.055 [INFO][3798] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.055 [INFO][3798] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.089 [INFO][3834] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.089 [INFO][3834] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.089 [INFO][3834] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.106 [WARNING][3834] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.106 [INFO][3834] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.112 [INFO][3834] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:48.128326 env[1215]: 2025-05-16 00:29:48.125 [INFO][3798] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:29:48.129531 env[1215]: time="2025-05-16T00:29:48.129491813Z" level=info msg="TearDown network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\" successfully" May 16 00:29:48.129681 env[1215]: time="2025-05-16T00:29:48.129661413Z" level=info msg="StopPodSandbox for \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\" returns successfully" May 16 00:29:48.131092 systemd[1]: run-netns-cni\x2d012dab98\x2d0d6d\x2dc082\x2dba5d\x2dbc28c92acfeb.mount: Deactivated successfully. May 16 00:29:48.132899 kubelet[1969]: E0516 00:29:48.132792 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:48.133712 env[1215]: time="2025-05-16T00:29:48.133677655Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dsghd,Uid:cc5835e5-f189-44ad-9314-f31fbd66b374,Namespace:kube-system,Attempt:1,}" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.050 [INFO][3815] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.050 [INFO][3815] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" iface="eth0" netns="/var/run/netns/cni-6e7d3812-10ac-c048-0abe-102379ab20ba" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.051 [INFO][3815] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" iface="eth0" netns="/var/run/netns/cni-6e7d3812-10ac-c048-0abe-102379ab20ba" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.051 [INFO][3815] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" iface="eth0" netns="/var/run/netns/cni-6e7d3812-10ac-c048-0abe-102379ab20ba" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.051 [INFO][3815] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.051 [INFO][3815] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.112 [INFO][3832] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.117 [INFO][3832] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.117 [INFO][3832] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.132 [WARNING][3832] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.132 [INFO][3832] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.137 [INFO][3832] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:48.150110 env[1215]: 2025-05-16 00:29:48.142 [INFO][3815] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:29:48.152553 systemd[1]: run-netns-cni\x2d6e7d3812\x2d10ac\x2dc048\x2d0abe\x2d102379ab20ba.mount: Deactivated successfully. May 16 00:29:48.154822 kubelet[1969]: E0516 00:29:48.154140 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:48.154873 env[1215]: time="2025-05-16T00:29:48.153750586Z" level=info msg="TearDown network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\" successfully" May 16 00:29:48.154873 env[1215]: time="2025-05-16T00:29:48.153808706Z" level=info msg="StopPodSandbox for \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\" returns successfully" May 16 00:29:48.163340 env[1215]: time="2025-05-16T00:29:48.155134787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-sgdm4,Uid:e34e54e0-2fe6-43cf-a937-170d6e7994c7,Namespace:kube-system,Attempt:1,}" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.068 [INFO][3811] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.068 [INFO][3811] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" iface="eth0" netns="/var/run/netns/cni-22d38d32-731e-3957-3e30-a93368814dc1" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.068 [INFO][3811] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" iface="eth0" netns="/var/run/netns/cni-22d38d32-731e-3957-3e30-a93368814dc1" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.069 [INFO][3811] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" iface="eth0" netns="/var/run/netns/cni-22d38d32-731e-3957-3e30-a93368814dc1" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.069 [INFO][3811] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.069 [INFO][3811] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.137 [INFO][3851] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.137 [INFO][3851] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.137 [INFO][3851] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.150 [WARNING][3851] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.150 [INFO][3851] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.161 [INFO][3851] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:48.167549 env[1215]: 2025-05-16 00:29:48.164 [INFO][3811] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:29:48.167549 env[1215]: time="2025-05-16T00:29:48.166263593Z" level=info msg="TearDown network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\" successfully" May 16 00:29:48.167549 env[1215]: time="2025-05-16T00:29:48.166303513Z" level=info msg="StopPodSandbox for \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\" returns successfully" May 16 00:29:48.168499 env[1215]: time="2025-05-16T00:29:48.168453515Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-5gb65,Uid:9f0bb5f5-a1b1-414f-a68e-79e577cbd224,Namespace:calico-apiserver,Attempt:1,}" May 16 00:29:48.190202 systemd-networkd[1043]: vxlan.calico: Link UP May 16 00:29:48.190209 systemd-networkd[1043]: vxlan.calico: Gained carrier May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit: BPF prog-id=152 op=LOAD May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd99873a8 a2=98 a3=ffffd9987398 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit: BPF prog-id=152 op=UNLOAD May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit: BPF prog-id=153 op=LOAD May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd9987088 a2=74 a3=95 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit: BPF prog-id=153 op=UNLOAD May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit: BPF prog-id=154 op=LOAD May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd99870e8 a2=94 a3=2 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit: BPF prog-id=154 op=UNLOAD May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd9987118 a2=28 a3=ffffd9987248 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9987148 a2=28 a3=ffffd9987278 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9986ff8 a2=28 a3=ffffd9987128 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd9987168 a2=28 a3=ffffd9987298 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd9987148 a2=28 a3=ffffd9987278 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd9987138 a2=28 a3=ffffd9987268 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd9987168 a2=28 a3=ffffd9987298 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9987148 a2=28 a3=ffffd9987278 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9987168 a2=28 a3=ffffd9987298 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.216000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.216000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd9987138 a2=28 a3=ffffd9987268 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.216000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffd99871b8 a2=28 a3=ffffd99872f8 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit: BPF prog-id=155 op=LOAD May 16 00:29:48.217000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd9986fd8 a2=40 a3=ffffd9987008 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.217000 audit: BPF prog-id=155 op=UNLOAD May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd9987000 a2=50 a3=0 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffd9987000 a2=50 a3=0 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit: BPF prog-id=156 op=LOAD May 16 00:29:48.217000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd9986768 a2=94 a3=2 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.217000 audit: BPF prog-id=156 op=UNLOAD May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { perfmon } for pid=3939 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit[3939]: AVC avc: denied { bpf } for pid=3939 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.217000 audit: BPF prog-id=157 op=LOAD May 16 00:29:48.217000 audit[3939]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd99868f8 a2=94 a3=30 items=0 ppid=3735 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.217000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit: BPF prog-id=158 op=LOAD May 16 00:29:48.222000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffd4b33098 a2=98 a3=ffffd4b33088 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.222000 audit: BPF prog-id=158 op=UNLOAD May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.222000 audit: BPF prog-id=159 op=LOAD May 16 00:29:48.222000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd4b32d28 a2=74 a3=95 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.222000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.223000 audit: BPF prog-id=159 op=UNLOAD May 16 00:29:48.223000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.223000 audit: BPF prog-id=160 op=LOAD May 16 00:29:48.223000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd4b32d88 a2=94 a3=2 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.223000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.223000 audit: BPF prog-id=160 op=UNLOAD May 16 00:29:48.366445 systemd-networkd[1043]: califee2d072e5f: Link UP May 16 00:29:48.367381 systemd-networkd[1043]: califee2d072e5f: Gained carrier May 16 00:29:48.368227 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califee2d072e5f: link becomes ready May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.231 [INFO][3888] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--dsghd-eth0 coredns-668d6bf9bc- kube-system cc5835e5-f189-44ad-9314-f31fbd66b374 967 0 2025-05-16 00:29:15 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-dsghd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] califee2d072e5f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.231 [INFO][3888] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.297 [INFO][3949] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" HandleID="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.298 [INFO][3949] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" HandleID="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001b0e20), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-dsghd", "timestamp":"2025-05-16 00:29:48.297893306 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.298 [INFO][3949] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.298 [INFO][3949] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.298 [INFO][3949] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.307 [INFO][3949] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.314 [INFO][3949] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.325 [INFO][3949] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.328 [INFO][3949] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.336 [INFO][3949] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.336 [INFO][3949] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.340 [INFO][3949] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.348 [INFO][3949] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.353 [INFO][3949] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.353 [INFO][3949] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" host="localhost" May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.353 [INFO][3949] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:48.391383 env[1215]: 2025-05-16 00:29:48.353 [INFO][3949] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" HandleID="k8s-pod-network.a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.392308 env[1215]: 2025-05-16 00:29:48.363 [INFO][3888] cni-plugin/k8s.go 418: Populated endpoint ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dsghd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cc5835e5-f189-44ad-9314-f31fbd66b374", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-dsghd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califee2d072e5f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:48.392308 env[1215]: 2025-05-16 00:29:48.363 [INFO][3888] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.392308 env[1215]: 2025-05-16 00:29:48.363 [INFO][3888] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califee2d072e5f ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.392308 env[1215]: 2025-05-16 00:29:48.367 [INFO][3888] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.392308 env[1215]: 2025-05-16 00:29:48.368 [INFO][3888] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dsghd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cc5835e5-f189-44ad-9314-f31fbd66b374", ResourceVersion:"967", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc", Pod:"coredns-668d6bf9bc-dsghd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califee2d072e5f", MAC:"ae:ef:8a:b0:ae:6f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:48.392308 env[1215]: 2025-05-16 00:29:48.380 [INFO][3888] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc" Namespace="kube-system" Pod="coredns-668d6bf9bc-dsghd" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:29:48.421455 env[1215]: time="2025-05-16T00:29:48.421371534Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:48.421455 env[1215]: time="2025-05-16T00:29:48.421417254Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:48.421455 env[1215]: time="2025-05-16T00:29:48.421427134Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:48.421903 env[1215]: time="2025-05-16T00:29:48.421729375Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc pid=3995 runtime=io.containerd.runc.v2 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit: BPF prog-id=161 op=LOAD May 16 00:29:48.431000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd4b32d48 a2=40 a3=ffffd4b32d78 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.431000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.431000 audit: BPF prog-id=161 op=UNLOAD May 16 00:29:48.431000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.431000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd4b32e60 a2=50 a3=0 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.431000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.444000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.444000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4b32db8 a2=28 a3=ffffd4b32ee8 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.444000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4b32de8 a2=28 a3=ffffd4b32f18 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4b32c98 a2=28 a3=ffffd4b32dc8 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4b32e08 a2=28 a3=ffffd4b32f38 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4b32de8 a2=28 a3=ffffd4b32f18 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4b32dd8 a2=28 a3=ffffd4b32f08 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4b32e08 a2=28 a3=ffffd4b32f38 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4b32de8 a2=28 a3=ffffd4b32f18 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4b32e08 a2=28 a3=ffffd4b32f38 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffd4b32dd8 a2=28 a3=ffffd4b32f08 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd4b32e58 a2=28 a3=ffffd4b32f98 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd4b32b90 a2=50 a3=0 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit: BPF prog-id=162 op=LOAD May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd4b32b98 a2=94 a3=5 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.445000 audit: BPF prog-id=162 op=UNLOAD May 16 00:29:48.445000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.445000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd4b32ca0 a2=50 a3=0 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.445000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffd4b32de8 a2=4 a3=3 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:29:48.455000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd4b32dc8 a2=94 a3=6 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:29:48.455000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd4b32598 a2=94 a3=83 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.455000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:29:48.455000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffd4b32598 a2=94 a3=83 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.455000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.456000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.456000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4b33fd8 a2=10 a3=ffffd4b340c8 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.456000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.456000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4b33e98 a2=10 a3=ffffd4b33f88 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.456000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.456000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4b33e08 a2=10 a3=ffffd4b33f88 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.456000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.456000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffd4b33e08 a2=10 a3=ffffd4b33f88 items=0 ppid=3735 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.456000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:29:48.462131 systemd[1]: Started cri-containerd-a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc.scope. May 16 00:29:48.464439 systemd-networkd[1043]: cali279d410317a: Link UP May 16 00:29:48.468878 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali279d410317a: link becomes ready May 16 00:29:48.469012 systemd-networkd[1043]: cali279d410317a: Gained carrier May 16 00:29:48.468000 audit: BPF prog-id=157 op=UNLOAD May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.265 [INFO][3913] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0 calico-apiserver-64555d77cf- calico-apiserver 9f0bb5f5-a1b1-414f-a68e-79e577cbd224 970 0 2025-05-16 00:29:25 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64555d77cf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-64555d77cf-5gb65 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali279d410317a [] [] }} ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.265 [INFO][3913] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.330 [INFO][3960] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" HandleID="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.330 [INFO][3960] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" HandleID="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000357620), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-64555d77cf-5gb65", "timestamp":"2025-05-16 00:29:48.330303844 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.330 [INFO][3960] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.353 [INFO][3960] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.353 [INFO][3960] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.408 [INFO][3960] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.414 [INFO][3960] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.420 [INFO][3960] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.422 [INFO][3960] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.428 [INFO][3960] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.428 [INFO][3960] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.430 [INFO][3960] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236 May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.435 [INFO][3960] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.444 [INFO][3960] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.444 [INFO][3960] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" host="localhost" May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.444 [INFO][3960] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:48.488623 env[1215]: 2025-05-16 00:29:48.444 [INFO][3960] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" HandleID="k8s-pod-network.2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.489267 env[1215]: 2025-05-16 00:29:48.459 [INFO][3913] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f0bb5f5-a1b1-414f-a68e-79e577cbd224", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-64555d77cf-5gb65", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali279d410317a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:48.489267 env[1215]: 2025-05-16 00:29:48.459 [INFO][3913] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.489267 env[1215]: 2025-05-16 00:29:48.460 [INFO][3913] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali279d410317a ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.489267 env[1215]: 2025-05-16 00:29:48.468 [INFO][3913] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.489267 env[1215]: 2025-05-16 00:29:48.468 [INFO][3913] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f0bb5f5-a1b1-414f-a68e-79e577cbd224", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236", Pod:"calico-apiserver-64555d77cf-5gb65", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali279d410317a", MAC:"26:3f:d6:48:fb:4a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:48.489267 env[1215]: 2025-05-16 00:29:48.484 [INFO][3913] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-5gb65" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:29:48.507435 env[1215]: time="2025-05-16T00:29:48.507359022Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:48.507605 env[1215]: time="2025-05-16T00:29:48.507410462Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:48.507605 env[1215]: time="2025-05-16T00:29:48.507420782Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:48.507702 env[1215]: time="2025-05-16T00:29:48.507630182Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236 pid=4040 runtime=io.containerd.runc.v2 May 16 00:29:48.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit: BPF prog-id=163 op=LOAD May 16 00:29:48.519000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3995 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323666316537636134646436363735336532353664363366316339 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3995 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323666316537636134646436363735336532353664363366316339 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.519000 audit: BPF prog-id=164 op=LOAD May 16 00:29:48.519000 audit[4006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3995 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.519000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323666316537636134646436363735336532353664363366316339 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit: BPF prog-id=165 op=LOAD May 16 00:29:48.520000 audit[4006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3995 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323666316537636134646436363735336532353664363366316339 May 16 00:29:48.520000 audit: BPF prog-id=165 op=UNLOAD May 16 00:29:48.520000 audit: BPF prog-id=164 op=UNLOAD May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { perfmon } for pid=4006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit[4006]: AVC avc: denied { bpf } for pid=4006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.520000 audit: BPF prog-id=166 op=LOAD May 16 00:29:48.520000 audit[4006]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3995 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137323666316537636134646436363735336532353664363366316339 May 16 00:29:48.521980 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:48.555270 systemd[1]: Started cri-containerd-2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236.scope. May 16 00:29:48.560660 env[1215]: time="2025-05-16T00:29:48.560617091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-dsghd,Uid:cc5835e5-f189-44ad-9314-f31fbd66b374,Namespace:kube-system,Attempt:1,} returns sandbox id \"a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc\"" May 16 00:29:48.561714 kubelet[1969]: E0516 00:29:48.561684 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:48.564008 env[1215]: time="2025-05-16T00:29:48.563968173Z" level=info msg="CreateContainer within sandbox \"a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 16 00:29:48.570266 systemd-networkd[1043]: cali1241cf92cfd: Link UP May 16 00:29:48.571877 systemd-networkd[1043]: cali1241cf92cfd: Gained carrier May 16 00:29:48.572277 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1241cf92cfd: link becomes ready May 16 00:29:48.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.589000 audit: BPF prog-id=167 op=LOAD May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.279 [INFO][3902] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0 coredns-668d6bf9bc- kube-system e34e54e0-2fe6-43cf-a937-170d6e7994c7 968 0 2025-05-16 00:29:15 +0000 UTC map[k8s-app:kube-dns pod-template-hash:668d6bf9bc projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-668d6bf9bc-sgdm4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali1241cf92cfd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.279 [INFO][3902] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.359 [INFO][3967] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" HandleID="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.359 [INFO][3967] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" HandleID="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000511880), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-668d6bf9bc-sgdm4", "timestamp":"2025-05-16 00:29:48.35969862 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.359 [INFO][3967] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.444 [INFO][3967] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.444 [INFO][3967] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.511 [INFO][3967] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.523 [INFO][3967] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.531 [INFO][3967] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.533 [INFO][3967] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.535 [INFO][3967] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.536 [INFO][3967] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.538 [INFO][3967] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2 May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.543 [INFO][3967] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.551 [INFO][3967] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.551 [INFO][3967] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" host="localhost" May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.551 [INFO][3967] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:48.594790 env[1215]: 2025-05-16 00:29:48.551 [INFO][3967] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" HandleID="k8s-pod-network.81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4040 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930326661313137383862623237356438313737636430396135 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4040 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930326661313137383862623237356438313737636430396135 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit: BPF prog-id=168 op=LOAD May 16 00:29:48.593000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4040 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930326661313137383862623237356438313737636430396135 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit: BPF prog-id=169 op=LOAD May 16 00:29:48.593000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4040 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930326661313137383862623237356438313737636430396135 May 16 00:29:48.593000 audit: BPF prog-id=169 op=UNLOAD May 16 00:29:48.593000 audit: BPF prog-id=168 op=UNLOAD May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { perfmon } for pid=4051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit[4051]: AVC avc: denied { bpf } for pid=4051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.593000 audit: BPF prog-id=170 op=LOAD May 16 00:29:48.593000 audit[4051]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4040 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.593000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266393930326661313137383862623237356438313737636430396135 May 16 00:29:48.597954 env[1215]: 2025-05-16 00:29:48.560 [INFO][3902] cni-plugin/k8s.go 418: Populated endpoint ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e34e54e0-2fe6-43cf-a937-170d6e7994c7", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-668d6bf9bc-sgdm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1241cf92cfd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:48.597954 env[1215]: 2025-05-16 00:29:48.560 [INFO][3902] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.597954 env[1215]: 2025-05-16 00:29:48.560 [INFO][3902] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1241cf92cfd ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.597954 env[1215]: 2025-05-16 00:29:48.571 [INFO][3902] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.597954 env[1215]: 2025-05-16 00:29:48.572 [INFO][3902] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e34e54e0-2fe6-43cf-a937-170d6e7994c7", ResourceVersion:"968", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2", Pod:"coredns-668d6bf9bc-sgdm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1241cf92cfd", MAC:"42:ee:f2:8d:37:b5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:48.597954 env[1215]: 2025-05-16 00:29:48.589 [INFO][3902] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2" Namespace="kube-system" Pod="coredns-668d6bf9bc-sgdm4" WorkloadEndpoint="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:29:48.596736 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:48.602931 env[1215]: time="2025-05-16T00:29:48.602887955Z" level=info msg="CreateContainer within sandbox \"a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"eaf5ee40299615880e185607cb357cf00ca1c72613c4a989e25bd3d4199ed7c6\"" May 16 00:29:48.604163 env[1215]: time="2025-05-16T00:29:48.604118795Z" level=info msg="StartContainer for \"eaf5ee40299615880e185607cb357cf00ca1c72613c4a989e25bd3d4199ed7c6\"" May 16 00:29:48.611000 audit[4102]: NETFILTER_CFG table=mangle:103 family=2 entries=16 op=nft_register_chain pid=4102 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:48.611000 audit[4102]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff4027a10 a2=0 a3=ffffa2daafa8 items=0 ppid=3735 pid=4102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.611000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:48.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.9:22-10.0.0.1:39006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:48.617536 systemd[1]: Started sshd@7-10.0.0.9:22-10.0.0.1:39006.service. May 16 00:29:48.622000 audit[4101]: NETFILTER_CFG table=nat:104 family=2 entries=15 op=nft_register_chain pid=4101 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:48.622000 audit[4101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffdc745e60 a2=0 a3=ffffb447dfa8 items=0 ppid=3735 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.622000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:48.625000 audit[4100]: NETFILTER_CFG table=raw:105 family=2 entries=21 op=nft_register_chain pid=4100 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:48.625000 audit[4100]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffef50ed70 a2=0 a3=ffff93b48fa8 items=0 ppid=3735 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.625000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:48.638874 env[1215]: time="2025-05-16T00:29:48.637687494Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:48.638874 env[1215]: time="2025-05-16T00:29:48.637748054Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:48.638874 env[1215]: time="2025-05-16T00:29:48.637761294Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:48.640035 env[1215]: time="2025-05-16T00:29:48.639996415Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-5gb65,Uid:9f0bb5f5-a1b1-414f-a68e-79e577cbd224,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236\"" May 16 00:29:48.640842 env[1215]: time="2025-05-16T00:29:48.639417455Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2 pid=4134 runtime=io.containerd.runc.v2 May 16 00:29:48.631000 audit[4107]: NETFILTER_CFG table=filter:106 family=2 entries=122 op=nft_register_chain pid=4107 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:48.631000 audit[4107]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=69792 a0=3 a1=ffffdcdd1810 a2=0 a3=ffffa168afa8 items=0 ppid=3735 pid=4107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.631000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:48.672603 systemd[1]: Started cri-containerd-eaf5ee40299615880e185607cb357cf00ca1c72613c4a989e25bd3d4199ed7c6.scope. May 16 00:29:48.685000 audit[4119]: USER_ACCT pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:48.686796 sshd[4119]: Accepted publickey for core from 10.0.0.1 port 39006 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:29:48.687000 audit[4119]: CRED_ACQ pid=4119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:48.687000 audit[4119]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe77bb2c0 a2=3 a3=1 items=0 ppid=1 pid=4119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.687000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:29:48.689207 sshd[4119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:29:48.695786 systemd[1]: Started session-8.scope. May 16 00:29:48.697502 systemd-logind[1202]: New session 8 of user core. May 16 00:29:48.704000 audit[4119]: USER_START pid=4119 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:48.706000 audit[4175]: CRED_ACQ pid=4175 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:48.715000 audit[4176]: NETFILTER_CFG table=filter:107 family=2 entries=112 op=nft_register_chain pid=4176 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:48.715000 audit[4176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=64116 a0=3 a1=ffffd3f3d2f0 a2=0 a3=ffffb8d0cfa8 items=0 ppid=3735 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.715000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:48.721874 systemd[1]: Started cri-containerd-81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2.scope. May 16 00:29:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.750000 audit: BPF prog-id=171 op=LOAD May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3995 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663565653430323939363135383830653138353630376362333537 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3995 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663565653430323939363135383830653138353630376362333537 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit: BPF prog-id=172 op=LOAD May 16 00:29:48.752000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3995 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663565653430323939363135383830653138353630376362333537 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit: BPF prog-id=173 op=LOAD May 16 00:29:48.752000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3995 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663565653430323939363135383830653138353630376362333537 May 16 00:29:48.752000 audit: BPF prog-id=173 op=UNLOAD May 16 00:29:48.752000 audit: BPF prog-id=172 op=UNLOAD May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { perfmon } for pid=4128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit[4128]: AVC avc: denied { bpf } for pid=4128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.752000 audit: BPF prog-id=174 op=LOAD May 16 00:29:48.752000 audit[4128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3995 pid=4128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561663565653430323939363135383830653138353630376362333537 May 16 00:29:48.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.758000 audit: BPF prog-id=175 op=LOAD May 16 00:29:48.761000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4134 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623434313663363262646636343165346238356536373864613262 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4134 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623434313663363262646636343165346238356536373864613262 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.761000 audit: BPF prog-id=176 op=LOAD May 16 00:29:48.761000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4134 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.761000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623434313663363262646636343165346238356536373864613262 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit: BPF prog-id=177 op=LOAD May 16 00:29:48.762000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4134 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623434313663363262646636343165346238356536373864613262 May 16 00:29:48.762000 audit: BPF prog-id=177 op=UNLOAD May 16 00:29:48.762000 audit: BPF prog-id=176 op=UNLOAD May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { perfmon } for pid=4151 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit[4151]: AVC avc: denied { bpf } for pid=4151 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.762000 audit: BPF prog-id=178 op=LOAD May 16 00:29:48.762000 audit[4151]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4134 pid=4151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.762000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831623434313663363262646636343165346238356536373864613262 May 16 00:29:48.763938 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:48.787267 env[1215]: time="2025-05-16T00:29:48.787220697Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-668d6bf9bc-sgdm4,Uid:e34e54e0-2fe6-43cf-a937-170d6e7994c7,Namespace:kube-system,Attempt:1,} returns sandbox id \"81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2\"" May 16 00:29:48.788275 kubelet[1969]: E0516 00:29:48.788249 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:48.791863 env[1215]: time="2025-05-16T00:29:48.791819179Z" level=info msg="CreateContainer within sandbox \"81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 16 00:29:48.800887 env[1215]: time="2025-05-16T00:29:48.800823664Z" level=info msg="StartContainer for \"eaf5ee40299615880e185607cb357cf00ca1c72613c4a989e25bd3d4199ed7c6\" returns successfully" May 16 00:29:48.816146 env[1215]: time="2025-05-16T00:29:48.816093873Z" level=info msg="CreateContainer within sandbox \"81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"53cab1b76fbfe832567c03c423b74c463c3e436b226bf54a622779e666aede11\"" May 16 00:29:48.818030 env[1215]: time="2025-05-16T00:29:48.817976754Z" level=info msg="StartContainer for \"53cab1b76fbfe832567c03c423b74c463c3e436b226bf54a622779e666aede11\"" May 16 00:29:48.835332 systemd[1]: Started cri-containerd-53cab1b76fbfe832567c03c423b74c463c3e436b226bf54a622779e666aede11.scope. May 16 00:29:48.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.857000 audit: BPF prog-id=179 op=LOAD May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4134 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533636162316237366662666538333235363763303363343233623734 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4134 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533636162316237366662666538333235363763303363343233623734 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit: BPF prog-id=180 op=LOAD May 16 00:29:48.858000 audit[4219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4134 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533636162316237366662666538333235363763303363343233623734 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit: BPF prog-id=181 op=LOAD May 16 00:29:48.858000 audit[4219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4134 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533636162316237366662666538333235363763303363343233623734 May 16 00:29:48.858000 audit: BPF prog-id=181 op=UNLOAD May 16 00:29:48.858000 audit: BPF prog-id=180 op=UNLOAD May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { perfmon } for pid=4219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit[4219]: AVC avc: denied { bpf } for pid=4219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:48.858000 audit: BPF prog-id=182 op=LOAD May 16 00:29:48.858000 audit[4219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4134 pid=4219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:48.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533636162316237366662666538333235363763303363343233623734 May 16 00:29:48.898766 env[1215]: time="2025-05-16T00:29:48.898710198Z" level=info msg="StartContainer for \"53cab1b76fbfe832567c03c423b74c463c3e436b226bf54a622779e666aede11\" returns successfully" May 16 00:29:48.907000 audit[4233]: AVC avc: denied { getattr } for pid=4233 comm="coredns" path="cgroup:[4026532491]" dev="nsfs" ino=4026532491 scontext=system_u:system_r:svirt_lxc_net_t:s0:c418,c768 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 16 00:29:48.907000 audit[4164]: AVC avc: denied { getattr } for pid=4164 comm="coredns" path="cgroup:[4026532484]" dev="nsfs" ino=4026532484 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1010 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 16 00:29:48.907000 audit[4233]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=400065a7f8 a2=40000da578 a3=0 items=0 ppid=4134 pid=4233 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c418,c768 key=(null) May 16 00:29:48.907000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 16 00:29:48.907000 audit[4164]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000154bb8 a2=4000156578 a3=0 items=0 ppid=3995 pid=4164 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1010 key=(null) May 16 00:29:48.907000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 16 00:29:48.927558 env[1215]: time="2025-05-16T00:29:48.927517534Z" level=info msg="StopPodSandbox for \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\"" May 16 00:29:48.982971 sshd[4119]: pam_unix(sshd:session): session closed for user core May 16 00:29:48.982000 audit[4119]: USER_END pid=4119 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:48.983000 audit[4119]: CRED_DISP pid=4119 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:48.986000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.9:22-10.0.0.1:39006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:48.986963 systemd-logind[1202]: Session 8 logged out. Waiting for processes to exit. May 16 00:29:48.987532 systemd[1]: sshd@7-10.0.0.9:22-10.0.0.1:39006.service: Deactivated successfully. May 16 00:29:48.988269 systemd[1]: session-8.scope: Deactivated successfully. May 16 00:29:48.993850 systemd-logind[1202]: Removed session 8. May 16 00:29:49.023425 systemd[1]: run-netns-cni\x2d22d38d32\x2d731e\x2d3957\x2d3e30\x2da93368814dc1.mount: Deactivated successfully. May 16 00:29:49.051120 systemd-networkd[1043]: cali0b3e4527d92: Gained IPv6LL May 16 00:29:49.063328 kubelet[1969]: E0516 00:29:49.063290 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:49.079844 kubelet[1969]: I0516 00:29:49.077740 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-dsghd" podStartSLOduration=34.077722735 podStartE2EDuration="34.077722735s" podCreationTimestamp="2025-05-16 00:29:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:29:49.077028494 +0000 UTC m=+39.231037235" watchObservedRunningTime="2025-05-16 00:29:49.077722735 +0000 UTC m=+39.231731476" May 16 00:29:49.086562 kubelet[1969]: E0516 00:29:49.085867 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:49.107000 audit[4288]: NETFILTER_CFG table=filter:108 family=2 entries=20 op=nft_register_rule pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.035 [INFO][4265] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.035 [INFO][4265] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" iface="eth0" netns="/var/run/netns/cni-c0880a62-c116-9903-4216-768f2cd3b85c" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.035 [INFO][4265] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" iface="eth0" netns="/var/run/netns/cni-c0880a62-c116-9903-4216-768f2cd3b85c" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.035 [INFO][4265] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" iface="eth0" netns="/var/run/netns/cni-c0880a62-c116-9903-4216-768f2cd3b85c" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.035 [INFO][4265] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.035 [INFO][4265] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.083 [INFO][4280] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.083 [INFO][4280] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.083 [INFO][4280] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.099 [WARNING][4280] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.099 [INFO][4280] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.104 [INFO][4280] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:49.112977 env[1215]: 2025-05-16 00:29:49.107 [INFO][4265] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:29:49.115235 systemd[1]: run-netns-cni\x2dc0880a62\x2dc116\x2d9903\x2d4216\x2d768f2cd3b85c.mount: Deactivated successfully. May 16 00:29:49.116475 env[1215]: time="2025-05-16T00:29:49.116431915Z" level=info msg="TearDown network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\" successfully" May 16 00:29:49.116589 env[1215]: time="2025-05-16T00:29:49.116475635Z" level=info msg="StopPodSandbox for \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\" returns successfully" May 16 00:29:49.107000 audit[4288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffcfc39350 a2=0 a3=1 items=0 ppid=2082 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:49.117549 env[1215]: time="2025-05-16T00:29:49.117521075Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nggsx,Uid:ba00be6e-83e4-4188-a55e-ca7c09f4110b,Namespace:calico-system,Attempt:1,}" May 16 00:29:49.117000 audit[4288]: NETFILTER_CFG table=nat:109 family=2 entries=14 op=nft_register_rule pid=4288 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:49.117000 audit[4288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcfc39350 a2=0 a3=1 items=0 ppid=2082 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:49.145000 audit[4304]: NETFILTER_CFG table=filter:110 family=2 entries=17 op=nft_register_rule pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:49.145000 audit[4304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffe64c3bf0 a2=0 a3=1 items=0 ppid=2082 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:49.157000 audit[4304]: NETFILTER_CFG table=nat:111 family=2 entries=47 op=nft_register_chain pid=4304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:49.157000 audit[4304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffe64c3bf0 a2=0 a3=1 items=0 ppid=2082 pid=4304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:49.259253 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:29:49.259484 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif3d51e9946c: link becomes ready May 16 00:29:49.257376 systemd-networkd[1043]: calif3d51e9946c: Link UP May 16 00:29:49.259188 systemd-networkd[1043]: calif3d51e9946c: Gained carrier May 16 00:29:49.270822 kubelet[1969]: I0516 00:29:49.270745 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-668d6bf9bc-sgdm4" podStartSLOduration=34.270724955 podStartE2EDuration="34.270724955s" podCreationTimestamp="2025-05-16 00:29:15 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:29:49.109697391 +0000 UTC m=+39.263706132" watchObservedRunningTime="2025-05-16 00:29:49.270724955 +0000 UTC m=+39.424733696" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.173 [INFO][4290] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0 goldmane-78d55f7ddc- calico-system ba00be6e-83e4-4188-a55e-ca7c09f4110b 998 0 2025-05-16 00:29:27 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-78d55f7ddc-nggsx eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] calif3d51e9946c [] [] }} ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.173 [INFO][4290] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.212 [INFO][4308] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" HandleID="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.212 [INFO][4308] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" HandleID="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40004361b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-78d55f7ddc-nggsx", "timestamp":"2025-05-16 00:29:49.212564004 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.212 [INFO][4308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.212 [INFO][4308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.212 [INFO][4308] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.222 [INFO][4308] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.228 [INFO][4308] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.236 [INFO][4308] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.238 [INFO][4308] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.240 [INFO][4308] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.240 [INFO][4308] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.241 [INFO][4308] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.246 [INFO][4308] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.252 [INFO][4308] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.252 [INFO][4308] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" host="localhost" May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.252 [INFO][4308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:49.279566 env[1215]: 2025-05-16 00:29:49.252 [INFO][4308] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" HandleID="k8s-pod-network.c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.280229 env[1215]: 2025-05-16 00:29:49.254 [INFO][4290] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"ba00be6e-83e4-4188-a55e-ca7c09f4110b", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-78d55f7ddc-nggsx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif3d51e9946c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:49.280229 env[1215]: 2025-05-16 00:29:49.255 [INFO][4290] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.280229 env[1215]: 2025-05-16 00:29:49.255 [INFO][4290] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif3d51e9946c ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.280229 env[1215]: 2025-05-16 00:29:49.259 [INFO][4290] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.280229 env[1215]: 2025-05-16 00:29:49.260 [INFO][4290] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"ba00be6e-83e4-4188-a55e-ca7c09f4110b", ResourceVersion:"998", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd", Pod:"goldmane-78d55f7ddc-nggsx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif3d51e9946c", MAC:"3a:dd:f3:87:f4:88", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:49.280229 env[1215]: 2025-05-16 00:29:49.272 [INFO][4290] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd" Namespace="calico-system" Pod="goldmane-78d55f7ddc-nggsx" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:29:49.290000 audit[4335]: NETFILTER_CFG table=filter:112 family=2 entries=66 op=nft_register_chain pid=4335 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:49.290000 audit[4335]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32784 a0=3 a1=ffffe9c86520 a2=0 a3=ffff9d2dbfa8 items=0 ppid=3735 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.290000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:49.292023 env[1215]: time="2025-05-16T00:29:49.290803005Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:49.292023 env[1215]: time="2025-05-16T00:29:49.290863605Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:49.292023 env[1215]: time="2025-05-16T00:29:49.290876805Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:49.292023 env[1215]: time="2025-05-16T00:29:49.291022405Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd pid=4334 runtime=io.containerd.runc.v2 May 16 00:29:49.303988 systemd[1]: Started cri-containerd-c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd.scope. May 16 00:29:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit: BPF prog-id=183 op=LOAD May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4334 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346130353863353162633563663861626430613666643130653466 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4334 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346130353863353162633563663861626430613666643130653466 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit: BPF prog-id=184 op=LOAD May 16 00:29:49.332000 audit[4344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4334 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346130353863353162633563663861626430613666643130653466 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit: BPF prog-id=185 op=LOAD May 16 00:29:49.332000 audit[4344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4334 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346130353863353162633563663861626430613666643130653466 May 16 00:29:49.332000 audit: BPF prog-id=185 op=UNLOAD May 16 00:29:49.332000 audit: BPF prog-id=184 op=UNLOAD May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { perfmon } for pid=4344 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit[4344]: AVC avc: denied { bpf } for pid=4344 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.332000 audit: BPF prog-id=186 op=LOAD May 16 00:29:49.332000 audit[4344]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4334 pid=4344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.332000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333346130353863353162633563663861626430613666643130653466 May 16 00:29:49.334580 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:49.353052 env[1215]: time="2025-05-16T00:29:49.353004157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-nggsx,Uid:ba00be6e-83e4-4188-a55e-ca7c09f4110b,Namespace:calico-system,Attempt:1,} returns sandbox id \"c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd\"" May 16 00:29:49.645300 env[1215]: time="2025-05-16T00:29:49.645225949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:49.659914 env[1215]: time="2025-05-16T00:29:49.659855956Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:49.662768 env[1215]: time="2025-05-16T00:29:49.662723158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:49.664152 env[1215]: time="2025-05-16T00:29:49.664103519Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:49.664842 env[1215]: time="2025-05-16T00:29:49.664794399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373\"" May 16 00:29:49.669952 env[1215]: time="2025-05-16T00:29:49.669836721Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 16 00:29:49.673704 env[1215]: time="2025-05-16T00:29:49.673661523Z" level=info msg="CreateContainer within sandbox \"b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 16 00:29:49.685011 env[1215]: time="2025-05-16T00:29:49.684964849Z" level=info msg="CreateContainer within sandbox \"b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7f60662ed06b4f646aeab2b80965f2bec09b321967731f6ba5ad1921cdf80c22\"" May 16 00:29:49.685896 env[1215]: time="2025-05-16T00:29:49.685870450Z" level=info msg="StartContainer for \"7f60662ed06b4f646aeab2b80965f2bec09b321967731f6ba5ad1921cdf80c22\"" May 16 00:29:49.703706 systemd[1]: Started cri-containerd-7f60662ed06b4f646aeab2b80965f2bec09b321967731f6ba5ad1921cdf80c22.scope. May 16 00:29:49.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit: BPF prog-id=187 op=LOAD May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=3697 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363036363265643036623466363436616561623262383039363566 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=3697 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363036363265643036623466363436616561623262383039363566 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit: BPF prog-id=188 op=LOAD May 16 00:29:49.739000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=3697 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363036363265643036623466363436616561623262383039363566 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit: BPF prog-id=189 op=LOAD May 16 00:29:49.739000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=3697 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363036363265643036623466363436616561623262383039363566 May 16 00:29:49.739000 audit: BPF prog-id=189 op=UNLOAD May 16 00:29:49.739000 audit: BPF prog-id=188 op=UNLOAD May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:49.739000 audit: BPF prog-id=190 op=LOAD May 16 00:29:49.739000 audit[4380]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=3697 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:49.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766363036363265643036623466363436616561623262383039363566 May 16 00:29:49.754411 systemd-networkd[1043]: califee2d072e5f: Gained IPv6LL May 16 00:29:49.766375 env[1215]: time="2025-05-16T00:29:49.766307251Z" level=info msg="StartContainer for \"7f60662ed06b4f646aeab2b80965f2bec09b321967731f6ba5ad1921cdf80c22\" returns successfully" May 16 00:29:49.929992 env[1215]: time="2025-05-16T00:29:49.928118295Z" level=info msg="StopPodSandbox for \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\"" May 16 00:29:50.010297 systemd-networkd[1043]: vxlan.calico: Gained IPv6LL May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.974 [INFO][4431] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.974 [INFO][4431] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" iface="eth0" netns="/var/run/netns/cni-8b136e41-e941-47c9-25c7-6fa3185b8504" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.974 [INFO][4431] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" iface="eth0" netns="/var/run/netns/cni-8b136e41-e941-47c9-25c7-6fa3185b8504" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.974 [INFO][4431] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" iface="eth0" netns="/var/run/netns/cni-8b136e41-e941-47c9-25c7-6fa3185b8504" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.974 [INFO][4431] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.974 [INFO][4431] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.997 [INFO][4440] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.997 [INFO][4440] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:49.997 [INFO][4440] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:50.010 [WARNING][4440] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:50.012 [INFO][4440] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:50.014 [INFO][4440] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:50.022844 env[1215]: 2025-05-16 00:29:50.020 [INFO][4431] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:29:50.023708 env[1215]: time="2025-05-16T00:29:50.023653784Z" level=info msg="TearDown network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\" successfully" May 16 00:29:50.023846 env[1215]: time="2025-05-16T00:29:50.023812984Z" level=info msg="StopPodSandbox for \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\" returns successfully" May 16 00:29:50.025720 systemd[1]: run-netns-cni\x2d8b136e41\x2de941\x2d47c9\x2d25c7\x2d6fa3185b8504.mount: Deactivated successfully. May 16 00:29:50.025905 env[1215]: time="2025-05-16T00:29:50.025852225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-2lds8,Uid:703f34ab-0c43-4709-b070-86f2f2f5a842,Namespace:calico-apiserver,Attempt:1,}" May 16 00:29:50.092857 kubelet[1969]: E0516 00:29:50.092750 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:50.092857 kubelet[1969]: E0516 00:29:50.092794 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:50.109852 kubelet[1969]: I0516 00:29:50.109773 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-77d955dd94-m7xnx" podStartSLOduration=19.728857187 podStartE2EDuration="22.109757426s" podCreationTimestamp="2025-05-16 00:29:28 +0000 UTC" firstStartedPulling="2025-05-16 00:29:47.284929 +0000 UTC m=+37.438937701" lastFinishedPulling="2025-05-16 00:29:49.665829199 +0000 UTC m=+39.819837940" observedRunningTime="2025-05-16 00:29:50.109599706 +0000 UTC m=+40.263608447" watchObservedRunningTime="2025-05-16 00:29:50.109757426 +0000 UTC m=+40.263766167" May 16 00:29:50.187916 systemd-networkd[1043]: cali09f2b6b37c6: Link UP May 16 00:29:50.189586 systemd-networkd[1043]: cali09f2b6b37c6: Gained carrier May 16 00:29:50.190183 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali09f2b6b37c6: link becomes ready May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.113 [INFO][4448] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0 calico-apiserver-64555d77cf- calico-apiserver 703f34ab-0c43-4709-b070-86f2f2f5a842 1032 0 2025-05-16 00:29:24 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:64555d77cf projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-64555d77cf-2lds8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali09f2b6b37c6 [] [] }} ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.113 [INFO][4448] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.139 [INFO][4465] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" HandleID="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.139 [INFO][4465] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" HandleID="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001374f0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-64555d77cf-2lds8", "timestamp":"2025-05-16 00:29:50.13958028 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.139 [INFO][4465] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.139 [INFO][4465] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.139 [INFO][4465] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.151 [INFO][4465] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.157 [INFO][4465] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.162 [INFO][4465] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.164 [INFO][4465] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.166 [INFO][4465] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.166 [INFO][4465] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.168 [INFO][4465] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.173 [INFO][4465] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.181 [INFO][4465] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.181 [INFO][4465] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" host="localhost" May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.181 [INFO][4465] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:50.207472 env[1215]: 2025-05-16 00:29:50.181 [INFO][4465] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" HandleID="k8s-pod-network.c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.208562 env[1215]: 2025-05-16 00:29:50.184 [INFO][4448] cni-plugin/k8s.go 418: Populated endpoint ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"703f34ab-0c43-4709-b070-86f2f2f5a842", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-64555d77cf-2lds8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali09f2b6b37c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:50.208562 env[1215]: 2025-05-16 00:29:50.184 [INFO][4448] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.208562 env[1215]: 2025-05-16 00:29:50.184 [INFO][4448] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali09f2b6b37c6 ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.208562 env[1215]: 2025-05-16 00:29:50.188 [INFO][4448] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.208562 env[1215]: 2025-05-16 00:29:50.189 [INFO][4448] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"703f34ab-0c43-4709-b070-86f2f2f5a842", ResourceVersion:"1032", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b", Pod:"calico-apiserver-64555d77cf-2lds8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali09f2b6b37c6", MAC:"92:09:d9:30:cb:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:50.208562 env[1215]: 2025-05-16 00:29:50.203 [INFO][4448] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b" Namespace="calico-apiserver" Pod="calico-apiserver-64555d77cf-2lds8" WorkloadEndpoint="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:29:50.215000 audit[4482]: NETFILTER_CFG table=filter:113 family=2 entries=59 op=nft_register_chain pid=4482 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:50.215000 audit[4482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=29476 a0=3 a1=ffffe37e2de0 a2=0 a3=ffff92f9dfa8 items=0 ppid=3735 pid=4482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:50.215000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:50.218947 env[1215]: time="2025-05-16T00:29:50.218873519Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:50.219083 env[1215]: time="2025-05-16T00:29:50.218919039Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:50.219083 env[1215]: time="2025-05-16T00:29:50.218943439Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:50.219193 env[1215]: time="2025-05-16T00:29:50.219148039Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b pid=4490 runtime=io.containerd.runc.v2 May 16 00:29:50.233610 systemd[1]: Started cri-containerd-c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b.scope. May 16 00:29:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.270000 audit: BPF prog-id=191 op=LOAD May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4490 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:50.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303137343631613936316134303561383365306134396234396666 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4490 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:50.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303137343631613936316134303561383365306134396234396666 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit: BPF prog-id=192 op=LOAD May 16 00:29:50.271000 audit[4500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4490 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:50.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303137343631613936316134303561383365306134396234396666 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit: BPF prog-id=193 op=LOAD May 16 00:29:50.271000 audit[4500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4490 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:50.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303137343631613936316134303561383365306134396234396666 May 16 00:29:50.271000 audit: BPF prog-id=193 op=UNLOAD May 16 00:29:50.271000 audit: BPF prog-id=192 op=UNLOAD May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { perfmon } for pid=4500 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit[4500]: AVC avc: denied { bpf } for pid=4500 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:50.271000 audit: BPF prog-id=194 op=LOAD May 16 00:29:50.271000 audit[4500]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4490 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:50.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336303137343631613936316134303561383365306134396234396666 May 16 00:29:50.273427 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:50.290642 env[1215]: time="2025-05-16T00:29:50.290294034Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-64555d77cf-2lds8,Uid:703f34ab-0c43-4709-b070-86f2f2f5a842,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b\"" May 16 00:29:50.458388 systemd-networkd[1043]: cali279d410317a: Gained IPv6LL May 16 00:29:50.586307 systemd-networkd[1043]: cali1241cf92cfd: Gained IPv6LL May 16 00:29:50.906295 systemd-networkd[1043]: calif3d51e9946c: Gained IPv6LL May 16 00:29:51.095450 kubelet[1969]: I0516 00:29:51.095403 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:29:51.096214 kubelet[1969]: E0516 00:29:51.095697 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:51.096214 kubelet[1969]: E0516 00:29:51.095805 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:29:51.482335 systemd-networkd[1043]: cali09f2b6b37c6: Gained IPv6LL May 16 00:29:51.518762 env[1215]: time="2025-05-16T00:29:51.518715935Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:51.521045 env[1215]: time="2025-05-16T00:29:51.521006376Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:51.522635 env[1215]: time="2025-05-16T00:29:51.522602977Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:51.523776 env[1215]: time="2025-05-16T00:29:51.523740537Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:51.524556 env[1215]: time="2025-05-16T00:29:51.524518938Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 16 00:29:51.526718 env[1215]: time="2025-05-16T00:29:51.526688299Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:29:51.528601 env[1215]: time="2025-05-16T00:29:51.528549699Z" level=info msg="CreateContainer within sandbox \"2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 16 00:29:51.541835 env[1215]: time="2025-05-16T00:29:51.541787505Z" level=info msg="CreateContainer within sandbox \"2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3c8322e55aa38ff3a0080a1587f4172de7c9fcb7f90255b4382720ad04dd8dbc\"" May 16 00:29:51.543340 env[1215]: time="2025-05-16T00:29:51.543284546Z" level=info msg="StartContainer for \"3c8322e55aa38ff3a0080a1587f4172de7c9fcb7f90255b4382720ad04dd8dbc\"" May 16 00:29:51.564500 systemd[1]: Started cri-containerd-3c8322e55aa38ff3a0080a1587f4172de7c9fcb7f90255b4382720ad04dd8dbc.scope. May 16 00:29:51.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit: BPF prog-id=195 op=LOAD May 16 00:29:51.604000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4040 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:51.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383332326535356161333866663361303038306131353837663431 May 16 00:29:51.604000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.604000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4040 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:51.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383332326535356161333866663361303038306131353837663431 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit: BPF prog-id=196 op=LOAD May 16 00:29:51.605000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4040 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383332326535356161333866663361303038306131353837663431 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit: BPF prog-id=197 op=LOAD May 16 00:29:51.605000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4040 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383332326535356161333866663361303038306131353837663431 May 16 00:29:51.605000 audit: BPF prog-id=197 op=UNLOAD May 16 00:29:51.605000 audit: BPF prog-id=196 op=UNLOAD May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { perfmon } for pid=4531 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit[4531]: AVC avc: denied { bpf } for pid=4531 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:51.605000 audit: BPF prog-id=198 op=LOAD May 16 00:29:51.605000 audit[4531]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4040 pid=4531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:51.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363383332326535356161333866663361303038306131353837663431 May 16 00:29:51.630677 env[1215]: time="2025-05-16T00:29:51.630625626Z" level=info msg="StartContainer for \"3c8322e55aa38ff3a0080a1587f4172de7c9fcb7f90255b4382720ad04dd8dbc\" returns successfully" May 16 00:29:51.680747 env[1215]: time="2025-05-16T00:29:51.680674089Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:29:51.693325 env[1215]: time="2025-05-16T00:29:51.693250974Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:29:51.693676 kubelet[1969]: E0516 00:29:51.693619 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:29:51.693765 kubelet[1969]: E0516 00:29:51.693685 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:29:51.694039 kubelet[1969]: E0516 00:29:51.693967 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-7j9xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-nggsx_calico-system(ba00be6e-83e4-4188-a55e-ca7c09f4110b): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:29:51.694161 env[1215]: time="2025-05-16T00:29:51.694064735Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 16 00:29:51.695221 kubelet[1969]: E0516 00:29:51.695150 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nggsx" podUID="ba00be6e-83e4-4188-a55e-ca7c09f4110b" May 16 00:29:51.931755 env[1215]: time="2025-05-16T00:29:51.931710363Z" level=info msg="StopPodSandbox for \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\"" May 16 00:29:52.047613 env[1215]: time="2025-05-16T00:29:52.047566174Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:52.049583 env[1215]: time="2025-05-16T00:29:52.049542735Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:52.050905 env[1215]: time="2025-05-16T00:29:52.050873736Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:52.052695 env[1215]: time="2025-05-16T00:29:52.052643417Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:52.053291 env[1215]: time="2025-05-16T00:29:52.053250097Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 16 00:29:52.060278 env[1215]: time="2025-05-16T00:29:52.060225260Z" level=info msg="CreateContainer within sandbox \"c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.046 [INFO][4576] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.046 [INFO][4576] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" iface="eth0" netns="/var/run/netns/cni-eb4cff58-b8aa-d329-522c-6e98ecc96ee7" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.046 [INFO][4576] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" iface="eth0" netns="/var/run/netns/cni-eb4cff58-b8aa-d329-522c-6e98ecc96ee7" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.046 [INFO][4576] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" iface="eth0" netns="/var/run/netns/cni-eb4cff58-b8aa-d329-522c-6e98ecc96ee7" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.046 [INFO][4576] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.046 [INFO][4576] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.077 [INFO][4585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.080 [INFO][4585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.080 [INFO][4585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.092 [WARNING][4585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.092 [INFO][4585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.094 [INFO][4585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:52.103361 env[1215]: 2025-05-16 00:29:52.096 [INFO][4576] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:29:52.103361 env[1215]: time="2025-05-16T00:29:52.099963997Z" level=info msg="TearDown network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\" successfully" May 16 00:29:52.103361 env[1215]: time="2025-05-16T00:29:52.100005677Z" level=info msg="StopPodSandbox for \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\" returns successfully" May 16 00:29:52.102408 systemd[1]: run-netns-cni\x2deb4cff58\x2db8aa\x2dd329\x2d522c\x2d6e98ecc96ee7.mount: Deactivated successfully. May 16 00:29:52.105917 env[1215]: time="2025-05-16T00:29:52.105817599Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dr4tx,Uid:c3fcf332-4196-4b8e-81cc-4698dfec5b10,Namespace:calico-system,Attempt:1,}" May 16 00:29:52.106120 kubelet[1969]: E0516 00:29:52.105838 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nggsx" podUID="ba00be6e-83e4-4188-a55e-ca7c09f4110b" May 16 00:29:52.122982 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2690506957.mount: Deactivated successfully. May 16 00:29:52.159000 audit[4595]: NETFILTER_CFG table=filter:114 family=2 entries=14 op=nft_register_rule pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:52.159000 audit[4595]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc96ef050 a2=0 a3=1 items=0 ppid=2082 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.159000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:52.169000 audit[4595]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:52.182600 kubelet[1969]: I0516 00:29:52.181960 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64555d77cf-5gb65" podStartSLOduration=24.299415391 podStartE2EDuration="27.181941352s" podCreationTimestamp="2025-05-16 00:29:25 +0000 UTC" firstStartedPulling="2025-05-16 00:29:48.643264657 +0000 UTC m=+38.797273358" lastFinishedPulling="2025-05-16 00:29:51.525790578 +0000 UTC m=+41.679799319" observedRunningTime="2025-05-16 00:29:52.133234651 +0000 UTC m=+42.287243392" watchObservedRunningTime="2025-05-16 00:29:52.181941352 +0000 UTC m=+42.335950053" May 16 00:29:52.169000 audit[4595]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc96ef050 a2=0 a3=1 items=0 ppid=2082 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.169000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:52.228000 audit[4597]: NETFILTER_CFG table=filter:116 family=2 entries=14 op=nft_register_rule pid=4597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:52.228000 audit[4597]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffe93a8f40 a2=0 a3=1 items=0 ppid=2082 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.228000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:52.238000 audit[4597]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4597 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:52.238000 audit[4597]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe93a8f40 a2=0 a3=1 items=0 ppid=2082 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:52.241982 env[1215]: time="2025-05-16T00:29:52.241934977Z" level=info msg="CreateContainer within sandbox \"c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"92bff41868eb8fc9c3502056e2c4de5801416f0590ed4e7d9246e3d04e34d899\"" May 16 00:29:52.242613 env[1215]: time="2025-05-16T00:29:52.242517938Z" level=info msg="StartContainer for \"92bff41868eb8fc9c3502056e2c4de5801416f0590ed4e7d9246e3d04e34d899\"" May 16 00:29:52.271329 systemd[1]: Started cri-containerd-92bff41868eb8fc9c3502056e2c4de5801416f0590ed4e7d9246e3d04e34d899.scope. May 16 00:29:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306445 kernel: kauditd_printk_skb: 1096 callbacks suppressed May 16 00:29:52.306498 kernel: audit: type=1400 audit(1747355392.304:1342): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.310727 kernel: audit: type=1400 audit(1747355392.304:1343): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.310809 kernel: audit: type=1400 audit(1747355392.304:1344): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.312647 kernel: audit: type=1400 audit(1747355392.304:1345): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.314542 kernel: audit: type=1400 audit(1747355392.304:1346): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.318602 kernel: audit: type=1400 audit(1747355392.304:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.318682 kernel: audit: type=1400 audit(1747355392.304:1348): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.322992 kernel: audit: type=1400 audit(1747355392.304:1349): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.323061 kernel: audit: type=1400 audit(1747355392.304:1350): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.324765 kernel: audit: type=1400 audit(1747355392.304:1351): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.304000 audit: BPF prog-id=199 op=LOAD May 16 00:29:52.306000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4490 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932626666343138363865623866633963333530323035366532633464 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4490 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932626666343138363865623866633963333530323035366532633464 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.306000 audit: BPF prog-id=200 op=LOAD May 16 00:29:52.306000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4490 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932626666343138363865623866633963333530323035366532633464 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.307000 audit: BPF prog-id=201 op=LOAD May 16 00:29:52.307000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4490 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932626666343138363865623866633963333530323035366532633464 May 16 00:29:52.309000 audit: BPF prog-id=201 op=UNLOAD May 16 00:29:52.309000 audit: BPF prog-id=200 op=UNLOAD May 16 00:29:52.309000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { perfmon } for pid=4605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit[4605]: AVC avc: denied { bpf } for pid=4605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.309000 audit: BPF prog-id=202 op=LOAD May 16 00:29:52.309000 audit[4605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4490 pid=4605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932626666343138363865623866633963333530323035366532633464 May 16 00:29:52.376205 env[1215]: time="2025-05-16T00:29:52.376119155Z" level=info msg="StartContainer for \"92bff41868eb8fc9c3502056e2c4de5801416f0590ed4e7d9246e3d04e34d899\" returns successfully" May 16 00:29:52.394227 systemd-networkd[1043]: caliae5a830aabc: Link UP May 16 00:29:52.397233 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:29:52.397363 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliae5a830aabc: link becomes ready May 16 00:29:52.396684 systemd-networkd[1043]: caliae5a830aabc: Gained carrier May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.300 [INFO][4607] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--dr4tx-eth0 csi-node-driver- calico-system c3fcf332-4196-4b8e-81cc-4698dfec5b10 1056 0 2025-05-16 00:29:28 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-dr4tx eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] caliae5a830aabc [] [] }} ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.300 [INFO][4607] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.337 [INFO][4636] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" HandleID="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.337 [INFO][4636] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" HandleID="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400012f7f0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-dr4tx", "timestamp":"2025-05-16 00:29:52.337035378 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.337 [INFO][4636] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.337 [INFO][4636] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.337 [INFO][4636] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.351 [INFO][4636] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.357 [INFO][4636] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.362 [INFO][4636] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.365 [INFO][4636] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.367 [INFO][4636] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.368 [INFO][4636] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.370 [INFO][4636] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.375 [INFO][4636] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.383 [INFO][4636] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.383 [INFO][4636] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" host="localhost" May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.383 [INFO][4636] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:29:52.415980 env[1215]: 2025-05-16 00:29:52.383 [INFO][4636] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" HandleID="k8s-pod-network.44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.416642 env[1215]: 2025-05-16 00:29:52.388 [INFO][4607] cni-plugin/k8s.go 418: Populated endpoint ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--dr4tx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c3fcf332-4196-4b8e-81cc-4698dfec5b10", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-dr4tx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliae5a830aabc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:52.416642 env[1215]: 2025-05-16 00:29:52.388 [INFO][4607] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.416642 env[1215]: 2025-05-16 00:29:52.388 [INFO][4607] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliae5a830aabc ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.416642 env[1215]: 2025-05-16 00:29:52.397 [INFO][4607] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.416642 env[1215]: 2025-05-16 00:29:52.398 [INFO][4607] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--dr4tx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c3fcf332-4196-4b8e-81cc-4698dfec5b10", ResourceVersion:"1056", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a", Pod:"csi-node-driver-dr4tx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliae5a830aabc", MAC:"06:02:38:5b:2c:da", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:29:52.416642 env[1215]: 2025-05-16 00:29:52.412 [INFO][4607] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a" Namespace="calico-system" Pod="csi-node-driver-dr4tx" WorkloadEndpoint="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:29:52.430659 env[1215]: time="2025-05-16T00:29:52.430556458Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:29:52.430819 env[1215]: time="2025-05-16T00:29:52.430667818Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:29:52.430819 env[1215]: time="2025-05-16T00:29:52.430696378Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:29:52.431322 env[1215]: time="2025-05-16T00:29:52.431258818Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a pid=4670 runtime=io.containerd.runc.v2 May 16 00:29:52.439000 audit[4683]: NETFILTER_CFG table=filter:118 family=2 entries=52 op=nft_register_chain pid=4683 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:29:52.439000 audit[4683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24296 a0=3 a1=ffffd1a1b140 a2=0 a3=ffff8a93cfa8 items=0 ppid=3735 pid=4683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.439000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:29:52.465823 systemd[1]: Started cri-containerd-44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a.scope. May 16 00:29:52.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit: BPF prog-id=203 op=LOAD May 16 00:29:52.483000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.483000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4670 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643762333066373736663130323365663635336136653463386335 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4670 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643762333066373736663130323365663635336136653463386335 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit: BPF prog-id=204 op=LOAD May 16 00:29:52.484000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4670 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643762333066373736663130323365663635336136653463386335 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit: BPF prog-id=205 op=LOAD May 16 00:29:52.484000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4670 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643762333066373736663130323365663635336136653463386335 May 16 00:29:52.484000 audit: BPF prog-id=205 op=UNLOAD May 16 00:29:52.484000 audit: BPF prog-id=204 op=UNLOAD May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { perfmon } for pid=4681 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit[4681]: AVC avc: denied { bpf } for pid=4681 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:52.484000 audit: BPF prog-id=206 op=LOAD May 16 00:29:52.484000 audit[4681]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4670 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434643762333066373736663130323365663635336136653463386335 May 16 00:29:52.487685 systemd-resolved[1156]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:29:52.506723 env[1215]: time="2025-05-16T00:29:52.506656211Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dr4tx,Uid:c3fcf332-4196-4b8e-81cc-4698dfec5b10,Namespace:calico-system,Attempt:1,} returns sandbox id \"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a\"" May 16 00:29:52.508798 env[1215]: time="2025-05-16T00:29:52.508758851Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 16 00:29:53.109274 kubelet[1969]: I0516 00:29:53.108911 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:29:53.121344 kubelet[1969]: I0516 00:29:53.120854 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-64555d77cf-2lds8" podStartSLOduration=27.355091525 podStartE2EDuration="29.12083679s" podCreationTimestamp="2025-05-16 00:29:24 +0000 UTC" firstStartedPulling="2025-05-16 00:29:50.291548674 +0000 UTC m=+40.445557415" lastFinishedPulling="2025-05-16 00:29:52.057293939 +0000 UTC m=+42.211302680" observedRunningTime="2025-05-16 00:29:53.120210309 +0000 UTC m=+43.274219050" watchObservedRunningTime="2025-05-16 00:29:53.12083679 +0000 UTC m=+43.274845531" May 16 00:29:53.253000 audit[4710]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:53.253000 audit[4710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffed812690 a2=0 a3=1 items=0 ppid=2082 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:53.253000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:53.262000 audit[4710]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:53.262000 audit[4710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffed812690 a2=0 a3=1 items=0 ppid=2082 pid=4710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:53.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:53.678020 env[1215]: time="2025-05-16T00:29:53.677965213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:53.679761 env[1215]: time="2025-05-16T00:29:53.679723693Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:53.681914 env[1215]: time="2025-05-16T00:29:53.681873054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:53.684229 env[1215]: time="2025-05-16T00:29:53.684120535Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:53.684895 env[1215]: time="2025-05-16T00:29:53.684858815Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 16 00:29:53.689915 env[1215]: time="2025-05-16T00:29:53.689867817Z" level=info msg="CreateContainer within sandbox \"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 16 00:29:53.717414 env[1215]: time="2025-05-16T00:29:53.717357028Z" level=info msg="CreateContainer within sandbox \"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9d7860c80e97a6b8419e71bdcdf87d59e03f12fd1376f4c4d7588ffbca92d541\"" May 16 00:29:53.718426 env[1215]: time="2025-05-16T00:29:53.718388309Z" level=info msg="StartContainer for \"9d7860c80e97a6b8419e71bdcdf87d59e03f12fd1376f4c4d7588ffbca92d541\"" May 16 00:29:53.747557 systemd[1]: Started cri-containerd-9d7860c80e97a6b8419e71bdcdf87d59e03f12fd1376f4c4d7588ffbca92d541.scope. May 16 00:29:53.776000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4670 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:53.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373836306338306539376136623834313965373162646364663837 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.776000 audit: BPF prog-id=207 op=LOAD May 16 00:29:53.776000 audit[4723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4670 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:53.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373836306338306539376136623834313965373162646364663837 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.777000 audit: BPF prog-id=208 op=LOAD May 16 00:29:53.777000 audit[4723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4670 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:53.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373836306338306539376136623834313965373162646364663837 May 16 00:29:53.778000 audit: BPF prog-id=208 op=UNLOAD May 16 00:29:53.778000 audit: BPF prog-id=207 op=UNLOAD May 16 00:29:53.778000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { perfmon } for pid=4723 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit[4723]: AVC avc: denied { bpf } for pid=4723 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:53.778000 audit: BPF prog-id=209 op=LOAD May 16 00:29:53.778000 audit[4723]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4670 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:53.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964373836306338306539376136623834313965373162646364663837 May 16 00:29:53.810143 env[1215]: time="2025-05-16T00:29:53.810091066Z" level=info msg="StartContainer for \"9d7860c80e97a6b8419e71bdcdf87d59e03f12fd1376f4c4d7588ffbca92d541\" returns successfully" May 16 00:29:53.812678 env[1215]: time="2025-05-16T00:29:53.812643067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 16 00:29:53.988320 systemd[1]: Started sshd@8-10.0.0.9:22-10.0.0.1:41748.service. May 16 00:29:53.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.9:22-10.0.0.1:41748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:54.042785 systemd-networkd[1043]: caliae5a830aabc: Gained IPv6LL May 16 00:29:54.043000 audit[4752]: USER_ACCT pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:54.044535 sshd[4752]: Accepted publickey for core from 10.0.0.1 port 41748 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:29:54.044000 audit[4752]: CRED_ACQ pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:54.044000 audit[4752]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd8a2d80 a2=3 a3=1 items=0 ppid=1 pid=4752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:54.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:29:54.046269 sshd[4752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:29:54.049912 systemd-logind[1202]: New session 9 of user core. May 16 00:29:54.054600 systemd[1]: Started session-9.scope. May 16 00:29:54.057000 audit[4752]: USER_START pid=4752 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:54.058000 audit[4754]: CRED_ACQ pid=4754 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:54.102931 systemd[1]: run-containerd-runc-k8s.io-9d7860c80e97a6b8419e71bdcdf87d59e03f12fd1376f4c4d7588ffbca92d541-runc.LoLJ4o.mount: Deactivated successfully. May 16 00:29:54.121108 kubelet[1969]: I0516 00:29:54.121072 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:29:54.264626 sshd[4752]: pam_unix(sshd:session): session closed for user core May 16 00:29:54.265000 audit[4752]: USER_END pid=4752 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:54.265000 audit[4752]: CRED_DISP pid=4752 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:54.267867 systemd[1]: sshd@8-10.0.0.9:22-10.0.0.1:41748.service: Deactivated successfully. May 16 00:29:54.268690 systemd[1]: session-9.scope: Deactivated successfully. May 16 00:29:54.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.9:22-10.0.0.1:41748 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:54.269209 systemd-logind[1202]: Session 9 logged out. Waiting for processes to exit. May 16 00:29:54.270271 systemd-logind[1202]: Removed session 9. May 16 00:29:54.714390 kubelet[1969]: I0516 00:29:54.714340 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:29:54.728000 audit[4542]: AVC avc: denied { watch } for pid=4542 comm="apiserver" path="/calico-apiserver-certs/..2025_05_16_00_29_34.1477585462/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c556,c694 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c556,c694 tclass=file permissive=0 May 16 00:29:54.728000 audit[4542]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d704c0 a2=fc6 a3=0 items=0 ppid=4040 pid=4542 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c556,c694 key=(null) May 16 00:29:54.728000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 16 00:29:54.801226 systemd[1]: run-containerd-runc-k8s.io-7f60662ed06b4f646aeab2b80965f2bec09b321967731f6ba5ad1921cdf80c22-runc.xwEmxC.mount: Deactivated successfully. May 16 00:29:55.006703 env[1215]: time="2025-05-16T00:29:55.006591839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:55.008555 env[1215]: time="2025-05-16T00:29:55.008513560Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:55.010159 env[1215]: time="2025-05-16T00:29:55.010124241Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:55.012312 env[1215]: time="2025-05-16T00:29:55.012247441Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 16 00:29:55.012583 env[1215]: time="2025-05-16T00:29:55.012549361Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:29:55.014786 env[1215]: time="2025-05-16T00:29:55.014724762Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:29:55.017579 env[1215]: time="2025-05-16T00:29:55.017477923Z" level=info msg="CreateContainer within sandbox \"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 16 00:29:55.030857 env[1215]: time="2025-05-16T00:29:55.030793568Z" level=info msg="CreateContainer within sandbox \"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3aa88b57ee65dfc03cbc2b6d064f4b6ad13858e010d263c5b7b120bf8221dc16\"" May 16 00:29:55.031841 env[1215]: time="2025-05-16T00:29:55.031812968Z" level=info msg="StartContainer for \"3aa88b57ee65dfc03cbc2b6d064f4b6ad13858e010d263c5b7b120bf8221dc16\"" May 16 00:29:55.051958 systemd[1]: Started cri-containerd-3aa88b57ee65dfc03cbc2b6d064f4b6ad13858e010d263c5b7b120bf8221dc16.scope. May 16 00:29:55.077000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.077000 audit[4817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4670 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:55.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361613838623537656536356466633033636263326236643036346634 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit: BPF prog-id=210 op=LOAD May 16 00:29:55.078000 audit[4817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4670 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:55.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361613838623537656536356466633033636263326236643036346634 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.078000 audit: BPF prog-id=211 op=LOAD May 16 00:29:55.078000 audit[4817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4670 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:55.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361613838623537656536356466633033636263326236643036346634 May 16 00:29:55.079000 audit: BPF prog-id=211 op=UNLOAD May 16 00:29:55.079000 audit: BPF prog-id=210 op=UNLOAD May 16 00:29:55.079000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { perfmon } for pid=4817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit[4817]: AVC avc: denied { bpf } for pid=4817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:29:55.079000 audit: BPF prog-id=212 op=LOAD May 16 00:29:55.079000 audit[4817]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4670 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:55.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361613838623537656536356466633033636263326236643036346634 May 16 00:29:55.099613 env[1215]: time="2025-05-16T00:29:55.098816352Z" level=info msg="StartContainer for \"3aa88b57ee65dfc03cbc2b6d064f4b6ad13858e010d263c5b7b120bf8221dc16\" returns successfully" May 16 00:29:55.129085 kubelet[1969]: I0516 00:29:55.128901 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:29:55.185056 env[1215]: time="2025-05-16T00:29:55.184997422Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:29:55.186183 env[1215]: time="2025-05-16T00:29:55.186118103Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:29:55.186590 kubelet[1969]: E0516 00:29:55.186546 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:29:55.186669 kubelet[1969]: E0516 00:29:55.186599 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:29:55.186768 kubelet[1969]: E0516 00:29:55.186730 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:82d6f6c415eb4a05980056a4429f1c21,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-87sdd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6d4674dbd4-g86bc_calico-system(fef8e377-d219-4f66-8658-d7c66547a7b5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:29:55.189003 env[1215]: time="2025-05-16T00:29:55.188970104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:29:55.323463 env[1215]: time="2025-05-16T00:29:55.323331071Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:29:55.325038 env[1215]: time="2025-05-16T00:29:55.324956391Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:29:55.325471 kubelet[1969]: E0516 00:29:55.325376 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:29:55.325471 kubelet[1969]: E0516 00:29:55.325432 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:29:55.325595 kubelet[1969]: E0516 00:29:55.325537 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-87sdd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6d4674dbd4-g86bc_calico-system(fef8e377-d219-4f66-8658-d7c66547a7b5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:29:55.326885 kubelet[1969]: E0516 00:29:55.326811 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6d4674dbd4-g86bc" podUID="fef8e377-d219-4f66-8658-d7c66547a7b5" May 16 00:29:55.331000 audit[4629]: AVC avc: denied { watch } for pid=4629 comm="apiserver" path="/calico-apiserver-certs/..2025_05_16_00_29_34.1800283951/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c520,c1022 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c520,c1022 tclass=file permissive=0 May 16 00:29:55.331000 audit[4629]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40015253e0 a2=fc6 a3=0 items=0 ppid=4490 pid=4629 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c520,c1022 key=(null) May 16 00:29:55.331000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 16 00:29:55.362190 kubelet[1969]: I0516 00:29:55.359364 1969 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-dr4tx" podStartSLOduration=24.853148612 podStartE2EDuration="27.359339763s" podCreationTimestamp="2025-05-16 00:29:28 +0000 UTC" firstStartedPulling="2025-05-16 00:29:52.508277531 +0000 UTC m=+42.662286232" lastFinishedPulling="2025-05-16 00:29:55.014468642 +0000 UTC m=+45.168477383" observedRunningTime="2025-05-16 00:29:55.153363051 +0000 UTC m=+45.307371752" watchObservedRunningTime="2025-05-16 00:29:55.359339763 +0000 UTC m=+45.513348504" May 16 00:29:55.378000 audit[4849]: NETFILTER_CFG table=filter:121 family=2 entries=13 op=nft_register_rule pid=4849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:55.378000 audit[4849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe278edb0 a2=0 a3=1 items=0 ppid=2082 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:55.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:55.386000 audit[4849]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=4849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:29:55.386000 audit[4849]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe278edb0 a2=0 a3=1 items=0 ppid=2082 pid=4849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:55.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:29:56.004377 kubelet[1969]: I0516 00:29:56.004336 1969 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 16 00:29:56.004604 kubelet[1969]: I0516 00:29:56.004590 1969 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 16 00:29:59.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.9:22-10.0.0.1:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.271495 systemd[1]: Started sshd@9-10.0.0.9:22-10.0.0.1:41764.service. May 16 00:29:59.275062 kernel: kauditd_printk_skb: 222 callbacks suppressed May 16 00:29:59.275281 kernel: audit: type=1130 audit(1747355399.270:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.9:22-10.0.0.1:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.320000 audit[4859]: USER_ACCT pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.321746 sshd[4859]: Accepted publickey for core from 10.0.0.1 port 41764 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:29:59.323662 sshd[4859]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:29:59.321000 audit[4859]: CRED_ACQ pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.326486 kernel: audit: type=1101 audit(1747355399.320:1407): pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.326543 kernel: audit: type=1103 audit(1747355399.321:1408): pid=4859 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.326562 kernel: audit: type=1006 audit(1747355399.321:1409): pid=4859 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 16 00:29:59.321000 audit[4859]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe493cbb0 a2=3 a3=1 items=0 ppid=1 pid=4859 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:59.331423 kernel: audit: type=1300 audit(1747355399.321:1409): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe493cbb0 a2=3 a3=1 items=0 ppid=1 pid=4859 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:59.331514 kernel: audit: type=1327 audit(1747355399.321:1409): proctitle=737368643A20636F7265205B707269765D May 16 00:29:59.321000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:29:59.330300 systemd-logind[1202]: New session 10 of user core. May 16 00:29:59.331203 systemd[1]: Started session-10.scope. May 16 00:29:59.333000 audit[4859]: USER_START pid=4859 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.335000 audit[4861]: CRED_ACQ pid=4861 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.339966 kernel: audit: type=1105 audit(1747355399.333:1410): pid=4859 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.340026 kernel: audit: type=1103 audit(1747355399.335:1411): pid=4861 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.534113 sshd[4859]: pam_unix(sshd:session): session closed for user core May 16 00:29:59.537916 systemd[1]: Started sshd@10-10.0.0.9:22-10.0.0.1:41780.service. May 16 00:29:59.536000 audit[4859]: USER_END pid=4859 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.9:22-10.0.0.1:41780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.542377 systemd[1]: sshd@9-10.0.0.9:22-10.0.0.1:41764.service: Deactivated successfully. May 16 00:29:59.544198 kernel: audit: type=1106 audit(1747355399.536:1412): pid=4859 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.544456 kernel: audit: type=1130 audit(1747355399.536:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.9:22-10.0.0.1:41780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.536000 audit[4859]: CRED_DISP pid=4859 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.9:22-10.0.0.1:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.543560 systemd[1]: session-10.scope: Deactivated successfully. May 16 00:29:59.544886 systemd-logind[1202]: Session 10 logged out. Waiting for processes to exit. May 16 00:29:59.545671 systemd-logind[1202]: Removed session 10. May 16 00:29:59.581000 audit[4872]: USER_ACCT pid=4872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.583151 sshd[4872]: Accepted publickey for core from 10.0.0.1 port 41780 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:29:59.583000 audit[4872]: CRED_ACQ pid=4872 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.583000 audit[4872]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffca6f4f70 a2=3 a3=1 items=0 ppid=1 pid=4872 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:59.583000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:29:59.584588 sshd[4872]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:29:59.588480 systemd-logind[1202]: New session 11 of user core. May 16 00:29:59.588860 systemd[1]: Started session-11.scope. May 16 00:29:59.591000 audit[4872]: USER_START pid=4872 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.592000 audit[4875]: CRED_ACQ pid=4875 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.770612 sshd[4872]: pam_unix(sshd:session): session closed for user core May 16 00:29:59.771392 systemd[1]: Started sshd@11-10.0.0.9:22-10.0.0.1:41796.service. May 16 00:29:59.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.9:22-10.0.0.1:41796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.777000 audit[4872]: USER_END pid=4872 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.778000 audit[4872]: CRED_DISP pid=4872 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.783148 systemd[1]: sshd@10-10.0.0.9:22-10.0.0.1:41780.service: Deactivated successfully. May 16 00:29:59.782000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.9:22-10.0.0.1:41780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.784137 systemd[1]: session-11.scope: Deactivated successfully. May 16 00:29:59.785500 systemd-logind[1202]: Session 11 logged out. Waiting for processes to exit. May 16 00:29:59.792120 systemd-logind[1202]: Removed session 11. May 16 00:29:59.830000 audit[4883]: USER_ACCT pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.831769 sshd[4883]: Accepted publickey for core from 10.0.0.1 port 41796 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:29:59.831000 audit[4883]: CRED_ACQ pid=4883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.831000 audit[4883]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4c74970 a2=3 a3=1 items=0 ppid=1 pid=4883 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:29:59.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:29:59.833119 sshd[4883]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:29:59.836922 systemd-logind[1202]: New session 12 of user core. May 16 00:29:59.837819 systemd[1]: Started session-12.scope. May 16 00:29:59.841000 audit[4883]: USER_START pid=4883 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.842000 audit[4886]: CRED_ACQ pid=4886 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.973592 sshd[4883]: pam_unix(sshd:session): session closed for user core May 16 00:29:59.973000 audit[4883]: USER_END pid=4883 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.973000 audit[4883]: CRED_DISP pid=4883 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:29:59.976153 systemd[1]: session-12.scope: Deactivated successfully. May 16 00:29:59.976727 systemd-logind[1202]: Session 12 logged out. Waiting for processes to exit. May 16 00:29:59.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.9:22-10.0.0.1:41796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:29:59.976872 systemd[1]: sshd@11-10.0.0.9:22-10.0.0.1:41796.service: Deactivated successfully. May 16 00:29:59.977973 systemd-logind[1202]: Removed session 12. May 16 00:30:04.978819 systemd[1]: Started sshd@12-10.0.0.9:22-10.0.0.1:54776.service. May 16 00:30:04.982199 kernel: kauditd_printk_skb: 23 callbacks suppressed May 16 00:30:04.982352 kernel: audit: type=1130 audit(1747355404.977:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.9:22-10.0.0.1:54776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:04.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.9:22-10.0.0.1:54776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:05.039000 audit[4903]: USER_ACCT pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.043362 sshd[4903]: Accepted publickey for core from 10.0.0.1 port 54776 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:05.045885 kernel: audit: type=1101 audit(1747355405.039:1434): pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.046661 kernel: audit: type=1103 audit(1747355405.044:1435): pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.044000 audit[4903]: CRED_ACQ pid=4903 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.045951 sshd[4903]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:05.050034 kernel: audit: type=1006 audit(1747355405.044:1436): pid=4903 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 16 00:30:05.050117 kernel: audit: type=1300 audit(1747355405.044:1436): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9ea01d0 a2=3 a3=1 items=0 ppid=1 pid=4903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:05.044000 audit[4903]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9ea01d0 a2=3 a3=1 items=0 ppid=1 pid=4903 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:05.049761 systemd-logind[1202]: New session 13 of user core. May 16 00:30:05.051642 systemd[1]: Started session-13.scope. May 16 00:30:05.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:05.053511 kernel: audit: type=1327 audit(1747355405.044:1436): proctitle=737368643A20636F7265205B707269765D May 16 00:30:05.055000 audit[4903]: USER_START pid=4903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.057000 audit[4905]: CRED_ACQ pid=4905 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.061355 kernel: audit: type=1105 audit(1747355405.055:1437): pid=4903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.061420 kernel: audit: type=1103 audit(1747355405.057:1438): pid=4905 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.250560 sshd[4903]: pam_unix(sshd:session): session closed for user core May 16 00:30:05.252000 audit[4903]: USER_END pid=4903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.255824 systemd[1]: sshd@12-10.0.0.9:22-10.0.0.1:54776.service: Deactivated successfully. May 16 00:30:05.256635 systemd[1]: session-13.scope: Deactivated successfully. May 16 00:30:05.257135 systemd-logind[1202]: Session 13 logged out. Waiting for processes to exit. May 16 00:30:05.253000 audit[4903]: CRED_DISP pid=4903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.258190 systemd-logind[1202]: Removed session 13. May 16 00:30:05.259727 kernel: audit: type=1106 audit(1747355405.252:1439): pid=4903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.259802 kernel: audit: type=1104 audit(1747355405.253:1440): pid=4903 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:05.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.9:22-10.0.0.1:54776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:06.928080 env[1215]: time="2025-05-16T00:30:06.927990820Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:30:07.127307 env[1215]: time="2025-05-16T00:30:07.127222453Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:30:07.128111 env[1215]: time="2025-05-16T00:30:07.128070893Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:30:07.128320 kubelet[1969]: E0516 00:30:07.128281 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:30:07.128609 kubelet[1969]: E0516 00:30:07.128334 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:30:07.128609 kubelet[1969]: E0516 00:30:07.128456 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-7j9xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-nggsx_calico-system(ba00be6e-83e4-4188-a55e-ca7c09f4110b): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:30:07.129655 kubelet[1969]: E0516 00:30:07.129624 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nggsx" podUID="ba00be6e-83e4-4188-a55e-ca7c09f4110b" May 16 00:30:07.271000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7310 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.271000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.271000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40031c83c0 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:30:07.271000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002bf3200 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:30:07.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:30:07.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:30:07.337000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.337000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40087f14e0 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:30:07.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:30:07.338000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7310 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.338000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40065bc0c0 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:30:07.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:30:07.343000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7306 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.343000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40065bc120 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:30:07.343000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:30:07.350000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.350000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40092e80c0 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:30:07.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:30:07.350000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7310 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.350000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40047a3f50 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:30:07.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:30:07.361000 audit[1860]: AVC avc: denied { watch } for pid=1860 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7312 scontext=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:07.361000 audit[1860]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=81 a1=40047a3fb0 a2=fc6 a3=0 items=0 ppid=1686 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c823,c855 key=(null) May 16 00:30:07.361000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E39002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 May 16 00:30:07.929139 kubelet[1969]: E0516 00:30:07.929045 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6d4674dbd4-g86bc" podUID="fef8e377-d219-4f66-8658-d7c66547a7b5" May 16 00:30:09.712376 kubelet[1969]: I0516 00:30:09.712341 1969 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:30:09.771000 audit[4923]: NETFILTER_CFG table=filter:123 family=2 entries=12 op=nft_register_rule pid=4923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:09.771000 audit[4923]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff02b3ce0 a2=0 a3=1 items=0 ppid=2082 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:09.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:09.779000 audit[4923]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=4923 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:09.779000 audit[4923]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff02b3ce0 a2=0 a3=1 items=0 ppid=2082 pid=4923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:09.779000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:09.923453 env[1215]: time="2025-05-16T00:30:09.923411198Z" level=info msg="StopPodSandbox for \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\"" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.959 [WARNING][4935] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" WorkloadEndpoint="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.959 [INFO][4935] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.959 [INFO][4935] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" iface="eth0" netns="" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.959 [INFO][4935] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.959 [INFO][4935] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.995 [INFO][4945] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.995 [INFO][4945] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:09.996 [INFO][4945] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:10.004 [WARNING][4945] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:10.004 [INFO][4945] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:10.014 [INFO][4945] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.019311 env[1215]: 2025-05-16 00:30:10.017 [INFO][4935] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.019311 env[1215]: time="2025-05-16T00:30:10.019009252Z" level=info msg="TearDown network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\" successfully" May 16 00:30:10.019311 env[1215]: time="2025-05-16T00:30:10.019063012Z" level=info msg="StopPodSandbox for \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\" returns successfully" May 16 00:30:10.019920 env[1215]: time="2025-05-16T00:30:10.019801252Z" level=info msg="RemovePodSandbox for \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\"" May 16 00:30:10.019920 env[1215]: time="2025-05-16T00:30:10.019831412Z" level=info msg="Forcibly stopping sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\"" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.053 [WARNING][4962] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" WorkloadEndpoint="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.053 [INFO][4962] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.053 [INFO][4962] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" iface="eth0" netns="" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.053 [INFO][4962] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.053 [INFO][4962] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.077 [INFO][4971] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.078 [INFO][4971] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.078 [INFO][4971] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.088 [WARNING][4971] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.088 [INFO][4971] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" HandleID="k8s-pod-network.144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" Workload="localhost-k8s-whisker--757f7fdb6b--td8lz-eth0" May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.090 [INFO][4971] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.093461 env[1215]: 2025-05-16 00:30:10.091 [INFO][4962] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e" May 16 00:30:10.093846 env[1215]: time="2025-05-16T00:30:10.093494382Z" level=info msg="TearDown network for sandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\" successfully" May 16 00:30:10.115887 env[1215]: time="2025-05-16T00:30:10.115822785Z" level=info msg="RemovePodSandbox \"144467bcd5d85d1a1730aa3a7e7a3f78f2427873cda0901f6dcc1d8873c8f79e\" returns successfully" May 16 00:30:10.116443 env[1215]: time="2025-05-16T00:30:10.116412265Z" level=info msg="StopPodSandbox for \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\"" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.167 [WARNING][4988] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0", GenerateName:"calico-kube-controllers-77d955dd94-", Namespace:"calico-system", SelfLink:"", UID:"a85f3374-0afa-4eca-90fb-15cd72a69095", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d955dd94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8", Pod:"calico-kube-controllers-77d955dd94-m7xnx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0b3e4527d92", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.172 [INFO][4988] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.172 [INFO][4988] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" iface="eth0" netns="" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.172 [INFO][4988] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.172 [INFO][4988] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.210 [INFO][4998] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.210 [INFO][4998] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.210 [INFO][4998] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.219 [WARNING][4998] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.219 [INFO][4998] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.221 [INFO][4998] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.224547 env[1215]: 2025-05-16 00:30:10.222 [INFO][4988] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.225144 env[1215]: time="2025-05-16T00:30:10.225110319Z" level=info msg="TearDown network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\" successfully" May 16 00:30:10.225286 env[1215]: time="2025-05-16T00:30:10.225255559Z" level=info msg="StopPodSandbox for \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\" returns successfully" May 16 00:30:10.225932 env[1215]: time="2025-05-16T00:30:10.225907839Z" level=info msg="RemovePodSandbox for \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\"" May 16 00:30:10.226015 env[1215]: time="2025-05-16T00:30:10.225942759Z" level=info msg="Forcibly stopping sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\"" May 16 00:30:10.256822 systemd[1]: Started sshd@13-10.0.0.9:22-10.0.0.1:54786.service. May 16 00:30:10.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.9:22-10.0.0.1:54786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:10.257656 kernel: kauditd_printk_skb: 31 callbacks suppressed May 16 00:30:10.257708 kernel: audit: type=1130 audit(1747355410.255:1452): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.9:22-10.0.0.1:54786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:10.308000 audit[5025]: USER_ACCT pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.310937 sshd[5025]: Accepted publickey for core from 10.0.0.1 port 54786 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:10.313437 kernel: audit: type=1101 audit(1747355410.308:1453): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.313000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.315526 sshd[5025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.266 [WARNING][5016] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0", GenerateName:"calico-kube-controllers-77d955dd94-", Namespace:"calico-system", SelfLink:"", UID:"a85f3374-0afa-4eca-90fb-15cd72a69095", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77d955dd94", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b560daab5d1f2c999eb4682d165613983696659ca8705ff6cf3c5276b54a3fa8", Pod:"calico-kube-controllers-77d955dd94-m7xnx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali0b3e4527d92", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.266 [INFO][5016] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.266 [INFO][5016] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" iface="eth0" netns="" May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.266 [INFO][5016] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.266 [INFO][5016] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.292 [INFO][5027] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.293 [INFO][5027] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.293 [INFO][5027] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.305 [WARNING][5027] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.305 [INFO][5027] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" HandleID="k8s-pod-network.68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" Workload="localhost-k8s-calico--kube--controllers--77d955dd94--m7xnx-eth0" May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.308 [INFO][5027] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.317272 env[1215]: 2025-05-16 00:30:10.314 [INFO][5016] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106" May 16 00:30:10.317682 env[1215]: time="2025-05-16T00:30:10.317308012Z" level=info msg="TearDown network for sandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\" successfully" May 16 00:30:10.319157 kernel: audit: type=1103 audit(1747355410.313:1454): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.319260 kernel: audit: type=1006 audit(1747355410.313:1455): pid=5025 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 16 00:30:10.319281 kernel: audit: type=1300 audit(1747355410.313:1455): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee7c9f80 a2=3 a3=1 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:10.313000 audit[5025]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffee7c9f80 a2=3 a3=1 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:10.320142 systemd-logind[1202]: New session 14 of user core. May 16 00:30:10.321089 systemd[1]: Started session-14.scope. May 16 00:30:10.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:10.323584 kernel: audit: type=1327 audit(1747355410.313:1455): proctitle=737368643A20636F7265205B707269765D May 16 00:30:10.324000 audit[5025]: USER_START pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.325000 audit[5036]: CRED_ACQ pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.331479 kernel: audit: type=1105 audit(1747355410.324:1456): pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.331545 kernel: audit: type=1103 audit(1747355410.325:1457): pid=5036 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.337178 env[1215]: time="2025-05-16T00:30:10.337113894Z" level=info msg="RemovePodSandbox \"68eafc88f9991e6ba8258880e19fd19602db72205aadca7a6f0fe77a0f983106\" returns successfully" May 16 00:30:10.337718 env[1215]: time="2025-05-16T00:30:10.337689974Z" level=info msg="StopPodSandbox for \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\"" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.383 [WARNING][5047] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--dr4tx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c3fcf332-4196-4b8e-81cc-4698dfec5b10", ResourceVersion:"1107", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a", Pod:"csi-node-driver-dr4tx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliae5a830aabc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.383 [INFO][5047] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.383 [INFO][5047] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" iface="eth0" netns="" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.383 [INFO][5047] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.383 [INFO][5047] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.413 [INFO][5059] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.413 [INFO][5059] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.414 [INFO][5059] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.425 [WARNING][5059] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.425 [INFO][5059] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.430 [INFO][5059] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.433174 env[1215]: 2025-05-16 00:30:10.431 [INFO][5047] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.433657 env[1215]: time="2025-05-16T00:30:10.433212227Z" level=info msg="TearDown network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\" successfully" May 16 00:30:10.433657 env[1215]: time="2025-05-16T00:30:10.433244707Z" level=info msg="StopPodSandbox for \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\" returns successfully" May 16 00:30:10.433889 env[1215]: time="2025-05-16T00:30:10.433861867Z" level=info msg="RemovePodSandbox for \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\"" May 16 00:30:10.434003 env[1215]: time="2025-05-16T00:30:10.433965307Z" level=info msg="Forcibly stopping sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\"" May 16 00:30:10.502195 sshd[5025]: pam_unix(sshd:session): session closed for user core May 16 00:30:10.501000 audit[5025]: USER_END pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.505061 systemd[1]: session-14.scope: Deactivated successfully. May 16 00:30:10.505680 systemd-logind[1202]: Session 14 logged out. Waiting for processes to exit. May 16 00:30:10.505848 systemd[1]: sshd@13-10.0.0.9:22-10.0.0.1:54786.service: Deactivated successfully. May 16 00:30:10.502000 audit[5025]: CRED_DISP pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.506934 systemd-logind[1202]: Removed session 14. May 16 00:30:10.509135 kernel: audit: type=1106 audit(1747355410.501:1458): pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.509228 kernel: audit: type=1104 audit(1747355410.502:1459): pid=5025 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:10.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.9:22-10.0.0.1:54786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.477 [WARNING][5082] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--dr4tx-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"c3fcf332-4196-4b8e-81cc-4698dfec5b10", ResourceVersion:"1107", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44d7b30f776f1023ef653a6e4c8c52cdbd0638e2a81a812a432b910c5c43bd9a", Pod:"csi-node-driver-dr4tx", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"caliae5a830aabc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.478 [INFO][5082] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.478 [INFO][5082] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" iface="eth0" netns="" May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.478 [INFO][5082] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.478 [INFO][5082] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.516 [INFO][5092] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.517 [INFO][5092] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.517 [INFO][5092] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.527 [WARNING][5092] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.527 [INFO][5092] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" HandleID="k8s-pod-network.d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" Workload="localhost-k8s-csi--node--driver--dr4tx-eth0" May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.529 [INFO][5092] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.533525 env[1215]: 2025-05-16 00:30:10.531 [INFO][5082] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571" May 16 00:30:10.534055 env[1215]: time="2025-05-16T00:30:10.534005721Z" level=info msg="TearDown network for sandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\" successfully" May 16 00:30:10.537045 env[1215]: time="2025-05-16T00:30:10.537002681Z" level=info msg="RemovePodSandbox \"d9e2e365e8ba1feaa8b43a2b7c8d51924e6afc2eea85d689c629338210412571\" returns successfully" May 16 00:30:10.537719 env[1215]: time="2025-05-16T00:30:10.537692201Z" level=info msg="StopPodSandbox for \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\"" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.573 [WARNING][5113] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"ba00be6e-83e4-4188-a55e-ca7c09f4110b", ResourceVersion:"1196", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd", Pod:"goldmane-78d55f7ddc-nggsx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif3d51e9946c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.573 [INFO][5113] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.573 [INFO][5113] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" iface="eth0" netns="" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.573 [INFO][5113] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.574 [INFO][5113] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.591 [INFO][5121] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.592 [INFO][5121] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.592 [INFO][5121] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.602 [WARNING][5121] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.602 [INFO][5121] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.607 [INFO][5121] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.611662 env[1215]: 2025-05-16 00:30:10.610 [INFO][5113] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.612148 env[1215]: time="2025-05-16T00:30:10.611689971Z" level=info msg="TearDown network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\" successfully" May 16 00:30:10.612148 env[1215]: time="2025-05-16T00:30:10.611723651Z" level=info msg="StopPodSandbox for \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\" returns successfully" May 16 00:30:10.612451 env[1215]: time="2025-05-16T00:30:10.612403411Z" level=info msg="RemovePodSandbox for \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\"" May 16 00:30:10.612500 env[1215]: time="2025-05-16T00:30:10.612444171Z" level=info msg="Forcibly stopping sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\"" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.649 [WARNING][5140] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"ba00be6e-83e4-4188-a55e-ca7c09f4110b", ResourceVersion:"1196", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c34a058c51bc5cf8abd0a6fd10e4fa35fdf874926c05a281ae34d3a32b310acd", Pod:"goldmane-78d55f7ddc-nggsx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"calif3d51e9946c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.649 [INFO][5140] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.649 [INFO][5140] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" iface="eth0" netns="" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.649 [INFO][5140] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.649 [INFO][5140] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.673 [INFO][5149] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.673 [INFO][5149] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.673 [INFO][5149] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.682 [WARNING][5149] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.682 [INFO][5149] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" HandleID="k8s-pod-network.b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" Workload="localhost-k8s-goldmane--78d55f7ddc--nggsx-eth0" May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.684 [INFO][5149] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.687515 env[1215]: 2025-05-16 00:30:10.685 [INFO][5140] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09" May 16 00:30:10.687931 env[1215]: time="2025-05-16T00:30:10.687538541Z" level=info msg="TearDown network for sandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\" successfully" May 16 00:30:10.690683 env[1215]: time="2025-05-16T00:30:10.690630102Z" level=info msg="RemovePodSandbox \"b0aa7768cb857f13d21e3ee962a3d9b93bc449f18e451c4d55beb3ab3262fb09\" returns successfully" May 16 00:30:10.691235 env[1215]: time="2025-05-16T00:30:10.691153422Z" level=info msg="StopPodSandbox for \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\"" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.725 [WARNING][5168] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"703f34ab-0c43-4709-b070-86f2f2f5a842", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b", Pod:"calico-apiserver-64555d77cf-2lds8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali09f2b6b37c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.726 [INFO][5168] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.726 [INFO][5168] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" iface="eth0" netns="" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.726 [INFO][5168] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.726 [INFO][5168] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.745 [INFO][5177] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.745 [INFO][5177] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.745 [INFO][5177] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.753 [WARNING][5177] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.753 [INFO][5177] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.754 [INFO][5177] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.758144 env[1215]: 2025-05-16 00:30:10.756 [INFO][5168] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.758596 env[1215]: time="2025-05-16T00:30:10.758192191Z" level=info msg="TearDown network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\" successfully" May 16 00:30:10.758596 env[1215]: time="2025-05-16T00:30:10.758231431Z" level=info msg="StopPodSandbox for \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\" returns successfully" May 16 00:30:10.758748 env[1215]: time="2025-05-16T00:30:10.758721871Z" level=info msg="RemovePodSandbox for \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\"" May 16 00:30:10.758790 env[1215]: time="2025-05-16T00:30:10.758758271Z" level=info msg="Forcibly stopping sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\"" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.794 [WARNING][5195] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"703f34ab-0c43-4709-b070-86f2f2f5a842", ResourceVersion:"1114", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c6017461a961a405a83e0a49b49ff6b50b11eac0782fb5484fbb4162fc68243b", Pod:"calico-apiserver-64555d77cf-2lds8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali09f2b6b37c6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.794 [INFO][5195] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.794 [INFO][5195] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" iface="eth0" netns="" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.794 [INFO][5195] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.794 [INFO][5195] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.813 [INFO][5204] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.813 [INFO][5204] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.813 [INFO][5204] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.823 [WARNING][5204] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.823 [INFO][5204] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" HandleID="k8s-pod-network.17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" Workload="localhost-k8s-calico--apiserver--64555d77cf--2lds8-eth0" May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.825 [INFO][5204] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.829145 env[1215]: 2025-05-16 00:30:10.827 [INFO][5195] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3" May 16 00:30:10.829605 env[1215]: time="2025-05-16T00:30:10.829204520Z" level=info msg="TearDown network for sandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\" successfully" May 16 00:30:10.832335 env[1215]: time="2025-05-16T00:30:10.832279560Z" level=info msg="RemovePodSandbox \"17017074e5a1a333934ff97d59fa58725f6c5f39db348d11c4a4085bc196ace3\" returns successfully" May 16 00:30:10.832827 env[1215]: time="2025-05-16T00:30:10.832797921Z" level=info msg="StopPodSandbox for \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\"" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.866 [WARNING][5222] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f0bb5f5-a1b1-414f-a68e-79e577cbd224", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236", Pod:"calico-apiserver-64555d77cf-5gb65", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali279d410317a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.866 [INFO][5222] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.866 [INFO][5222] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" iface="eth0" netns="" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.866 [INFO][5222] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.866 [INFO][5222] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.884 [INFO][5232] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.884 [INFO][5232] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.885 [INFO][5232] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.893 [WARNING][5232] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.893 [INFO][5232] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.894 [INFO][5232] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.898765 env[1215]: 2025-05-16 00:30:10.896 [INFO][5222] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.901286 env[1215]: time="2025-05-16T00:30:10.901244810Z" level=info msg="TearDown network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\" successfully" May 16 00:30:10.901349 env[1215]: time="2025-05-16T00:30:10.901286450Z" level=info msg="StopPodSandbox for \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\" returns successfully" May 16 00:30:10.901775 env[1215]: time="2025-05-16T00:30:10.901751010Z" level=info msg="RemovePodSandbox for \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\"" May 16 00:30:10.901831 env[1215]: time="2025-05-16T00:30:10.901782170Z" level=info msg="Forcibly stopping sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\"" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.932 [WARNING][5250] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0", GenerateName:"calico-apiserver-64555d77cf-", Namespace:"calico-apiserver", SelfLink:"", UID:"9f0bb5f5-a1b1-414f-a68e-79e577cbd224", ResourceVersion:"1210", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 25, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"64555d77cf", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2f9902fa11788bb275d8177cd09a56066d72ee2059dcfdcfd1d74b32c434a236", Pod:"calico-apiserver-64555d77cf-5gb65", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali279d410317a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.932 [INFO][5250] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.932 [INFO][5250] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" iface="eth0" netns="" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.932 [INFO][5250] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.933 [INFO][5250] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.950 [INFO][5259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.950 [INFO][5259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.950 [INFO][5259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.958 [WARNING][5259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.958 [INFO][5259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" HandleID="k8s-pod-network.89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" Workload="localhost-k8s-calico--apiserver--64555d77cf--5gb65-eth0" May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.960 [INFO][5259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:10.963948 env[1215]: 2025-05-16 00:30:10.962 [INFO][5250] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8" May 16 00:30:10.964564 env[1215]: time="2025-05-16T00:30:10.963971418Z" level=info msg="TearDown network for sandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\" successfully" May 16 00:30:10.966961 env[1215]: time="2025-05-16T00:30:10.966913578Z" level=info msg="RemovePodSandbox \"89963e307ce350d5ba63b2ab3273ccf918f98cb591cb86dcc8e11c5f04df37e8\" returns successfully" May 16 00:30:10.967470 env[1215]: time="2025-05-16T00:30:10.967443859Z" level=info msg="StopPodSandbox for \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\"" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:10.999 [WARNING][5277] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e34e54e0-2fe6-43cf-a937-170d6e7994c7", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2", Pod:"coredns-668d6bf9bc-sgdm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1241cf92cfd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:10.999 [INFO][5277] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:10.999 [INFO][5277] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" iface="eth0" netns="" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:10.999 [INFO][5277] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:10.999 [INFO][5277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:11.021 [INFO][5287] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:11.021 [INFO][5287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:11.021 [INFO][5287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:11.030 [WARNING][5287] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:11.030 [INFO][5287] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:11.032 [INFO][5287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:11.035733 env[1215]: 2025-05-16 00:30:11.034 [INFO][5277] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.036192 env[1215]: time="2025-05-16T00:30:11.035771227Z" level=info msg="TearDown network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\" successfully" May 16 00:30:11.036192 env[1215]: time="2025-05-16T00:30:11.035802027Z" level=info msg="StopPodSandbox for \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\" returns successfully" May 16 00:30:11.036302 env[1215]: time="2025-05-16T00:30:11.036258387Z" level=info msg="RemovePodSandbox for \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\"" May 16 00:30:11.036366 env[1215]: time="2025-05-16T00:30:11.036311347Z" level=info msg="Forcibly stopping sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\"" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.066 [WARNING][5306] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"e34e54e0-2fe6-43cf-a937-170d6e7994c7", ResourceVersion:"1008", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"81b4416c62bdf641e4b85e678da2b3ce62783a1b3cb1a8d1d1b667d2348566a2", Pod:"coredns-668d6bf9bc-sgdm4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali1241cf92cfd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.067 [INFO][5306] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.067 [INFO][5306] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" iface="eth0" netns="" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.067 [INFO][5306] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.067 [INFO][5306] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.087 [INFO][5315] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.087 [INFO][5315] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.087 [INFO][5315] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.096 [WARNING][5315] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.096 [INFO][5315] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" HandleID="k8s-pod-network.25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" Workload="localhost-k8s-coredns--668d6bf9bc--sgdm4-eth0" May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.097 [INFO][5315] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:11.101142 env[1215]: 2025-05-16 00:30:11.099 [INFO][5306] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62" May 16 00:30:11.101697 env[1215]: time="2025-05-16T00:30:11.101210516Z" level=info msg="TearDown network for sandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\" successfully" May 16 00:30:11.104315 env[1215]: time="2025-05-16T00:30:11.104274516Z" level=info msg="RemovePodSandbox \"25a2463d36ad64226d9dcdee4d2eb24c93ec2f17b3a91514ccfe48fcdf775e62\" returns successfully" May 16 00:30:11.104761 env[1215]: time="2025-05-16T00:30:11.104733076Z" level=info msg="StopPodSandbox for \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\"" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.135 [WARNING][5332] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dsghd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cc5835e5-f189-44ad-9314-f31fbd66b374", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc", Pod:"coredns-668d6bf9bc-dsghd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califee2d072e5f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.135 [INFO][5332] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.135 [INFO][5332] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" iface="eth0" netns="" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.135 [INFO][5332] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.135 [INFO][5332] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.152 [INFO][5341] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.152 [INFO][5341] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.153 [INFO][5341] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.161 [WARNING][5341] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.161 [INFO][5341] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.162 [INFO][5341] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:11.166978 env[1215]: 2025-05-16 00:30:11.164 [INFO][5332] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.166978 env[1215]: time="2025-05-16T00:30:11.165641444Z" level=info msg="TearDown network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\" successfully" May 16 00:30:11.166978 env[1215]: time="2025-05-16T00:30:11.165676084Z" level=info msg="StopPodSandbox for \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\" returns successfully" May 16 00:30:11.167646 env[1215]: time="2025-05-16T00:30:11.167230324Z" level=info msg="RemovePodSandbox for \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\"" May 16 00:30:11.167646 env[1215]: time="2025-05-16T00:30:11.167324044Z" level=info msg="Forcibly stopping sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\"" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.206 [WARNING][5359] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--668d6bf9bc--dsghd-eth0", GenerateName:"coredns-668d6bf9bc-", Namespace:"kube-system", SelfLink:"", UID:"cc5835e5-f189-44ad-9314-f31fbd66b374", ResourceVersion:"1003", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 29, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"668d6bf9bc", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"a726f1e7ca4dd66753e256d63f1c987f5e7d6796c994b6e9268954ece17e3abc", Pod:"coredns-668d6bf9bc-dsghd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"califee2d072e5f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.206 [INFO][5359] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.206 [INFO][5359] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" iface="eth0" netns="" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.206 [INFO][5359] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.206 [INFO][5359] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.225 [INFO][5367] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.225 [INFO][5367] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.225 [INFO][5367] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.235 [WARNING][5367] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.235 [INFO][5367] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" HandleID="k8s-pod-network.eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" Workload="localhost-k8s-coredns--668d6bf9bc--dsghd-eth0" May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.236 [INFO][5367] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:30:11.240180 env[1215]: 2025-05-16 00:30:11.238 [INFO][5359] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752" May 16 00:30:11.240612 env[1215]: time="2025-05-16T00:30:11.240225973Z" level=info msg="TearDown network for sandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\" successfully" May 16 00:30:11.243137 env[1215]: time="2025-05-16T00:30:11.243099413Z" level=info msg="RemovePodSandbox \"eea1ac9ecc06ca67da291186280c1c44579222051d30fd98a6759a2cafe2e752\" returns successfully" May 16 00:30:13.930000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:13.930000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:13.930000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400332d380 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:30:13.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:30:13.930000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40031c9760 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:30:13.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:30:13.931000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:13.931000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400332d520 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:30:13.931000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7304 scontext=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:30:13.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:30:13.931000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40031c9780 a2=fc6 a3=0 items=0 ppid=1685 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c88,c161 key=(null) May 16 00:30:13.931000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:30:15.507325 systemd[1]: Started sshd@14-10.0.0.9:22-10.0.0.1:36344.service. May 16 00:30:15.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.9:22-10.0.0.1:36344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:15.508347 kernel: kauditd_printk_skb: 13 callbacks suppressed May 16 00:30:15.508479 kernel: audit: type=1130 audit(1747355415.506:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.9:22-10.0.0.1:36344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:15.553585 sshd[5399]: Accepted publickey for core from 10.0.0.1 port 36344 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:15.554902 sshd[5399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:15.552000 audit[5399]: USER_ACCT pid=5399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.553000 audit[5399]: CRED_ACQ pid=5399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.562207 kernel: audit: type=1101 audit(1747355415.552:1466): pid=5399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.562303 kernel: audit: type=1103 audit(1747355415.553:1467): pid=5399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.562322 kernel: audit: type=1006 audit(1747355415.553:1468): pid=5399 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 16 00:30:15.562421 systemd[1]: Started session-15.scope. May 16 00:30:15.562809 kernel: audit: type=1300 audit(1747355415.553:1468): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc586f060 a2=3 a3=1 items=0 ppid=1 pid=5399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:15.553000 audit[5399]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc586f060 a2=3 a3=1 items=0 ppid=1 pid=5399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:15.562735 systemd-logind[1202]: New session 15 of user core. May 16 00:30:15.553000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:15.567597 kernel: audit: type=1327 audit(1747355415.553:1468): proctitle=737368643A20636F7265205B707269765D May 16 00:30:15.566000 audit[5399]: USER_START pid=5399 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.567000 audit[5401]: CRED_ACQ pid=5401 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.572900 kernel: audit: type=1105 audit(1747355415.566:1469): pid=5399 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.572949 kernel: audit: type=1103 audit(1747355415.567:1470): pid=5401 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.684145 sshd[5399]: pam_unix(sshd:session): session closed for user core May 16 00:30:15.683000 audit[5399]: USER_END pid=5399 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.686696 systemd[1]: sshd@14-10.0.0.9:22-10.0.0.1:36344.service: Deactivated successfully. May 16 00:30:15.683000 audit[5399]: CRED_DISP pid=5399 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.687490 systemd[1]: session-15.scope: Deactivated successfully. May 16 00:30:15.688307 systemd-logind[1202]: Session 15 logged out. Waiting for processes to exit. May 16 00:30:15.689222 systemd-logind[1202]: Removed session 15. May 16 00:30:15.689931 kernel: audit: type=1106 audit(1747355415.683:1471): pid=5399 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.690006 kernel: audit: type=1104 audit(1747355415.683:1472): pid=5399 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:15.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.9:22-10.0.0.1:36344 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:17.930409 kubelet[1969]: E0516 00:30:17.930361 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nggsx" podUID="ba00be6e-83e4-4188-a55e-ca7c09f4110b" May 16 00:30:19.928576 env[1215]: time="2025-05-16T00:30:19.928533738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:30:20.082754 env[1215]: time="2025-05-16T00:30:20.082694257Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:30:20.083586 env[1215]: time="2025-05-16T00:30:20.083555544Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:30:20.083776 kubelet[1969]: E0516 00:30:20.083741 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:30:20.084023 kubelet[1969]: E0516 00:30:20.083790 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:30:20.084023 kubelet[1969]: E0516 00:30:20.083885 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:82d6f6c415eb4a05980056a4429f1c21,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-87sdd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6d4674dbd4-g86bc_calico-system(fef8e377-d219-4f66-8658-d7c66547a7b5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:30:20.085911 env[1215]: time="2025-05-16T00:30:20.085869004Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:30:20.244494 env[1215]: time="2025-05-16T00:30:20.244364743Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:30:20.245655 env[1215]: time="2025-05-16T00:30:20.245603474Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:30:20.245966 kubelet[1969]: E0516 00:30:20.245928 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:30:20.246030 kubelet[1969]: E0516 00:30:20.245979 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:30:20.246116 kubelet[1969]: E0516 00:30:20.246080 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-87sdd,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6d4674dbd4-g86bc_calico-system(fef8e377-d219-4f66-8658-d7c66547a7b5): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:30:20.247512 kubelet[1969]: E0516 00:30:20.247465 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6d4674dbd4-g86bc" podUID="fef8e377-d219-4f66-8658-d7c66547a7b5" May 16 00:30:20.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.9:22-10.0.0.1:36352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:20.689198 systemd[1]: Started sshd@15-10.0.0.9:22-10.0.0.1:36352.service. May 16 00:30:20.692209 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:30:20.692269 kernel: audit: type=1130 audit(1747355420.688:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.9:22-10.0.0.1:36352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:20.731000 audit[5417]: USER_ACCT pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.732505 sshd[5417]: Accepted publickey for core from 10.0.0.1 port 36352 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:20.733606 sshd[5417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:20.732000 audit[5417]: CRED_ACQ pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.736944 kernel: audit: type=1101 audit(1747355420.731:1475): pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.737007 kernel: audit: type=1103 audit(1747355420.732:1476): pid=5417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.737026 kernel: audit: type=1006 audit(1747355420.732:1477): pid=5417 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 16 00:30:20.737531 systemd-logind[1202]: New session 16 of user core. May 16 00:30:20.737982 systemd[1]: Started session-16.scope. May 16 00:30:20.738312 kernel: audit: type=1300 audit(1747355420.732:1477): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb363160 a2=3 a3=1 items=0 ppid=1 pid=5417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:20.732000 audit[5417]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb363160 a2=3 a3=1 items=0 ppid=1 pid=5417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:20.740692 kernel: audit: type=1327 audit(1747355420.732:1477): proctitle=737368643A20636F7265205B707269765D May 16 00:30:20.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:20.740000 audit[5417]: USER_START pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.744651 kernel: audit: type=1105 audit(1747355420.740:1478): pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.744743 kernel: audit: type=1103 audit(1747355420.742:1479): pid=5419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.742000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.870702 sshd[5417]: pam_unix(sshd:session): session closed for user core May 16 00:30:20.870000 audit[5417]: USER_END pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.870000 audit[5417]: CRED_DISP pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.876466 systemd[1]: sshd@15-10.0.0.9:22-10.0.0.1:36352.service: Deactivated successfully. May 16 00:30:20.876864 kernel: audit: type=1106 audit(1747355420.870:1480): pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.876922 kernel: audit: type=1104 audit(1747355420.870:1481): pid=5417 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.9:22-10.0.0.1:36352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:20.877107 systemd[1]: session-16.scope: Deactivated successfully. May 16 00:30:20.877714 systemd-logind[1202]: Session 16 logged out. Waiting for processes to exit. May 16 00:30:20.879082 systemd[1]: Started sshd@16-10.0.0.9:22-10.0.0.1:36368.service. May 16 00:30:20.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.9:22-10.0.0.1:36368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:20.879870 systemd-logind[1202]: Removed session 16. May 16 00:30:20.923000 audit[5430]: USER_ACCT pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.925032 sshd[5430]: Accepted publickey for core from 10.0.0.1 port 36368 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:20.924000 audit[5430]: CRED_ACQ pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.925000 audit[5430]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1000100 a2=3 a3=1 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:20.925000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:20.926512 sshd[5430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:20.929987 systemd-logind[1202]: New session 17 of user core. May 16 00:30:20.930767 systemd[1]: Started session-17.scope. May 16 00:30:20.932000 audit[5430]: USER_START pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:20.934000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.136133 sshd[5430]: pam_unix(sshd:session): session closed for user core May 16 00:30:21.136000 audit[5430]: USER_END pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.136000 audit[5430]: CRED_DISP pid=5430 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.140864 systemd[1]: Started sshd@17-10.0.0.9:22-10.0.0.1:36372.service. May 16 00:30:21.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.9:22-10.0.0.1:36372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:21.141477 systemd[1]: sshd@16-10.0.0.9:22-10.0.0.1:36368.service: Deactivated successfully. May 16 00:30:21.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.9:22-10.0.0.1:36368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:21.142342 systemd[1]: session-17.scope: Deactivated successfully. May 16 00:30:21.142881 systemd-logind[1202]: Session 17 logged out. Waiting for processes to exit. May 16 00:30:21.143656 systemd-logind[1202]: Removed session 17. May 16 00:30:21.187000 audit[5442]: USER_ACCT pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.189231 sshd[5442]: Accepted publickey for core from 10.0.0.1 port 36372 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:21.188000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.188000 audit[5442]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3d30ea0 a2=3 a3=1 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:21.188000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:21.190710 sshd[5442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:21.194268 systemd-logind[1202]: New session 18 of user core. May 16 00:30:21.195178 systemd[1]: Started session-18.scope. May 16 00:30:21.198000 audit[5442]: USER_START pid=5442 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.199000 audit[5445]: CRED_ACQ pid=5445 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.869000 audit[5457]: NETFILTER_CFG table=filter:125 family=2 entries=24 op=nft_register_rule pid=5457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:21.869000 audit[5457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffe0238eb0 a2=0 a3=1 items=0 ppid=2082 pid=5457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:21.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:21.876000 audit[5457]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=5457 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:21.876000 audit[5457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe0238eb0 a2=0 a3=1 items=0 ppid=2082 pid=5457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:21.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:21.885657 sshd[5442]: pam_unix(sshd:session): session closed for user core May 16 00:30:21.885000 audit[5442]: USER_END pid=5442 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.885000 audit[5442]: CRED_DISP pid=5442 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.889090 systemd[1]: Started sshd@18-10.0.0.9:22-10.0.0.1:36384.service. May 16 00:30:21.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.9:22-10.0.0.1:36384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:21.889673 systemd[1]: sshd@17-10.0.0.9:22-10.0.0.1:36372.service: Deactivated successfully. May 16 00:30:21.889000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.9:22-10.0.0.1:36372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:21.891363 systemd[1]: session-18.scope: Deactivated successfully. May 16 00:30:21.892492 systemd-logind[1202]: Session 18 logged out. Waiting for processes to exit. May 16 00:30:21.893361 systemd-logind[1202]: Removed session 18. May 16 00:30:21.900000 audit[5462]: NETFILTER_CFG table=filter:127 family=2 entries=36 op=nft_register_rule pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:21.900000 audit[5462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffce1e64d0 a2=0 a3=1 items=0 ppid=2082 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:21.900000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:21.907000 audit[5462]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:21.907000 audit[5462]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffce1e64d0 a2=0 a3=1 items=0 ppid=2082 pid=5462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:21.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:21.946000 audit[5459]: USER_ACCT pid=5459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.947529 sshd[5459]: Accepted publickey for core from 10.0.0.1 port 36384 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:21.947000 audit[5459]: CRED_ACQ pid=5459 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.947000 audit[5459]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd33c3160 a2=3 a3=1 items=0 ppid=1 pid=5459 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:21.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:21.949428 sshd[5459]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:21.953379 systemd-logind[1202]: New session 19 of user core. May 16 00:30:21.954153 systemd[1]: Started session-19.scope. May 16 00:30:21.956000 audit[5459]: USER_START pid=5459 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:21.958000 audit[5464]: CRED_ACQ pid=5464 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.301508 sshd[5459]: pam_unix(sshd:session): session closed for user core May 16 00:30:22.303763 systemd[1]: Started sshd@19-10.0.0.9:22-10.0.0.1:36386.service. May 16 00:30:22.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.9:22-10.0.0.1:36386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:22.304000 audit[5459]: USER_END pid=5459 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.305000 audit[5459]: CRED_DISP pid=5459 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.308596 systemd[1]: sshd@18-10.0.0.9:22-10.0.0.1:36384.service: Deactivated successfully. May 16 00:30:22.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.9:22-10.0.0.1:36384 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:22.309448 systemd[1]: session-19.scope: Deactivated successfully. May 16 00:30:22.310082 systemd-logind[1202]: Session 19 logged out. Waiting for processes to exit. May 16 00:30:22.311246 systemd-logind[1202]: Removed session 19. May 16 00:30:22.354000 audit[5473]: USER_ACCT pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.356187 sshd[5473]: Accepted publickey for core from 10.0.0.1 port 36386 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:22.356000 audit[5473]: CRED_ACQ pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.356000 audit[5473]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff503900 a2=3 a3=1 items=0 ppid=1 pid=5473 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:22.356000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:22.357965 sshd[5473]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:22.362335 systemd-logind[1202]: New session 20 of user core. May 16 00:30:22.363350 systemd[1]: Started session-20.scope. May 16 00:30:22.366000 audit[5473]: USER_START pid=5473 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.368000 audit[5476]: CRED_ACQ pid=5476 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.510890 sshd[5473]: pam_unix(sshd:session): session closed for user core May 16 00:30:22.510000 audit[5473]: USER_END pid=5473 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.510000 audit[5473]: CRED_DISP pid=5473 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:22.513684 systemd[1]: sshd@19-10.0.0.9:22-10.0.0.1:36386.service: Deactivated successfully. May 16 00:30:22.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.9:22-10.0.0.1:36386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:22.514590 systemd[1]: session-20.scope: Deactivated successfully. May 16 00:30:22.515359 systemd-logind[1202]: Session 20 logged out. Waiting for processes to exit. May 16 00:30:22.516220 systemd-logind[1202]: Removed session 20. May 16 00:30:23.927418 kubelet[1969]: E0516 00:30:23.927382 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:30:24.786189 systemd[1]: run-containerd-runc-k8s.io-7f60662ed06b4f646aeab2b80965f2bec09b321967731f6ba5ad1921cdf80c22-runc.LD67XQ.mount: Deactivated successfully. May 16 00:30:26.926814 kubelet[1969]: E0516 00:30:26.926774 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:30:26.985191 kernel: kauditd_printk_skb: 57 callbacks suppressed May 16 00:30:26.985334 kernel: audit: type=1325 audit(1747355426.978:1523): table=filter:129 family=2 entries=24 op=nft_register_rule pid=5507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:26.985365 kernel: audit: type=1300 audit(1747355426.978:1523): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff86106d0 a2=0 a3=1 items=0 ppid=2082 pid=5507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:26.985388 kernel: audit: type=1327 audit(1747355426.978:1523): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:26.978000 audit[5507]: NETFILTER_CFG table=filter:129 family=2 entries=24 op=nft_register_rule pid=5507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:26.978000 audit[5507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff86106d0 a2=0 a3=1 items=0 ppid=2082 pid=5507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:26.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:26.987000 audit[5507]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=5507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:26.987000 audit[5507]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff86106d0 a2=0 a3=1 items=0 ppid=2082 pid=5507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:26.993553 kernel: audit: type=1325 audit(1747355426.987:1524): table=nat:130 family=2 entries=106 op=nft_register_chain pid=5507 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:30:26.993624 kernel: audit: type=1300 audit(1747355426.987:1524): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=fffff86106d0 a2=0 a3=1 items=0 ppid=2082 pid=5507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:26.993653 kernel: audit: type=1327 audit(1747355426.987:1524): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:26.987000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:30:27.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.9:22-10.0.0.1:32862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:27.515334 systemd[1]: Started sshd@20-10.0.0.9:22-10.0.0.1:32862.service. May 16 00:30:27.518186 kernel: audit: type=1130 audit(1747355427.514:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.9:22-10.0.0.1:32862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:27.562000 audit[5509]: USER_ACCT pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.563547 sshd[5509]: Accepted publickey for core from 10.0.0.1 port 32862 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:27.564669 sshd[5509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:27.563000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.569182 kernel: audit: type=1101 audit(1747355427.562:1526): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.569263 kernel: audit: type=1103 audit(1747355427.563:1527): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.569298 kernel: audit: type=1006 audit(1747355427.563:1528): pid=5509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 16 00:30:27.563000 audit[5509]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd04d1a40 a2=3 a3=1 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:27.563000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:27.570512 systemd[1]: Started session-21.scope. May 16 00:30:27.570661 systemd-logind[1202]: New session 21 of user core. May 16 00:30:27.573000 audit[5509]: USER_START pid=5509 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.574000 audit[5511]: CRED_ACQ pid=5511 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.685953 sshd[5509]: pam_unix(sshd:session): session closed for user core May 16 00:30:27.685000 audit[5509]: USER_END pid=5509 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.685000 audit[5509]: CRED_DISP pid=5509 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:27.688722 systemd[1]: sshd@20-10.0.0.9:22-10.0.0.1:32862.service: Deactivated successfully. May 16 00:30:27.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.9:22-10.0.0.1:32862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:27.689526 systemd[1]: session-21.scope: Deactivated successfully. May 16 00:30:27.690031 systemd-logind[1202]: Session 21 logged out. Waiting for processes to exit. May 16 00:30:27.690711 systemd-logind[1202]: Removed session 21. May 16 00:30:31.928653 env[1215]: time="2025-05-16T00:30:31.928583395Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:30:32.102421 env[1215]: time="2025-05-16T00:30:32.102358223Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:30:32.103274 env[1215]: time="2025-05-16T00:30:32.103230269Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:30:32.103504 kubelet[1969]: E0516 00:30:32.103462 1969 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:30:32.103833 kubelet[1969]: E0516 00:30:32.103809 1969 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:30:32.104065 kubelet[1969]: E0516 00:30:32.104018 1969 kuberuntime_manager.go:1341] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-7j9xc,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-nggsx_calico-system(ba00be6e-83e4-4188-a55e-ca7c09f4110b): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:30:32.105357 kubelet[1969]: E0516 00:30:32.105324 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-nggsx" podUID="ba00be6e-83e4-4188-a55e-ca7c09f4110b" May 16 00:30:32.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.9:22-10.0.0.1:56770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:32.690973 systemd[1]: Started sshd@21-10.0.0.9:22-10.0.0.1:56770.service. May 16 00:30:32.691933 kernel: kauditd_printk_skb: 7 callbacks suppressed May 16 00:30:32.691987 kernel: audit: type=1130 audit(1747355432.689:1534): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.9:22-10.0.0.1:56770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:32.739000 audit[5530]: USER_ACCT pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.740660 sshd[5530]: Accepted publickey for core from 10.0.0.1 port 56770 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:32.741982 sshd[5530]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:32.740000 audit[5530]: CRED_ACQ pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.745643 kernel: audit: type=1101 audit(1747355432.739:1535): pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.745716 kernel: audit: type=1103 audit(1747355432.740:1536): pid=5530 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.745744 kernel: audit: type=1006 audit(1747355432.740:1537): pid=5530 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 16 00:30:32.745896 systemd-logind[1202]: New session 22 of user core. May 16 00:30:32.746734 systemd[1]: Started session-22.scope. May 16 00:30:32.740000 audit[5530]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1599d10 a2=3 a3=1 items=0 ppid=1 pid=5530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:32.749835 kernel: audit: type=1300 audit(1747355432.740:1537): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1599d10 a2=3 a3=1 items=0 ppid=1 pid=5530 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:32.750849 kernel: audit: type=1327 audit(1747355432.740:1537): proctitle=737368643A20636F7265205B707269765D May 16 00:30:32.750888 kernel: audit: type=1105 audit(1747355432.749:1538): pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:32.749000 audit[5530]: USER_START pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.750000 audit[5532]: CRED_ACQ pid=5532 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.755802 kernel: audit: type=1103 audit(1747355432.750:1539): pid=5532 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.905521 sshd[5530]: pam_unix(sshd:session): session closed for user core May 16 00:30:32.905000 audit[5530]: USER_END pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.905000 audit[5530]: CRED_DISP pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.908299 systemd[1]: sshd@21-10.0.0.9:22-10.0.0.1:56770.service: Deactivated successfully. May 16 00:30:32.909038 systemd[1]: session-22.scope: Deactivated successfully. May 16 00:30:32.909748 systemd-logind[1202]: Session 22 logged out. Waiting for processes to exit. May 16 00:30:32.910440 systemd-logind[1202]: Removed session 22. May 16 00:30:32.911387 kernel: audit: type=1106 audit(1747355432.905:1540): pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.911439 kernel: audit: type=1104 audit(1747355432.905:1541): pid=5530 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:32.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.9:22-10.0.0.1:56770 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:34.928153 kubelet[1969]: E0516 00:30:34.928108 1969 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6d4674dbd4-g86bc" podUID="fef8e377-d219-4f66-8658-d7c66547a7b5" May 16 00:30:37.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.9:22-10.0.0.1:56782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:37.923538 systemd[1]: Started sshd@22-10.0.0.9:22-10.0.0.1:56782.service. May 16 00:30:37.924292 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:30:37.924324 kernel: audit: type=1130 audit(1747355437.922:1543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.9:22-10.0.0.1:56782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:37.977000 audit[5563]: USER_ACCT pid=5563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:37.978709 sshd[5563]: Accepted publickey for core from 10.0.0.1 port 56782 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:37.981323 kernel: audit: type=1101 audit(1747355437.977:1544): pid=5563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:37.981373 kernel: audit: type=1103 audit(1747355437.978:1545): pid=5563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:37.978000 audit[5563]: CRED_ACQ pid=5563 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:37.979868 sshd[5563]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:37.987191 kernel: audit: type=1006 audit(1747355437.978:1546): pid=5563 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 16 00:30:37.987289 kernel: audit: type=1300 audit(1747355437.978:1546): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe00abab0 a2=3 a3=1 items=0 ppid=1 pid=5563 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:37.987313 kernel: audit: type=1327 audit(1747355437.978:1546): proctitle=737368643A20636F7265205B707269765D May 16 00:30:37.978000 audit[5563]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe00abab0 a2=3 a3=1 items=0 ppid=1 pid=5563 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:37.978000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:37.984221 systemd-logind[1202]: New session 23 of user core. May 16 00:30:37.986107 systemd[1]: Started session-23.scope. May 16 00:30:37.997000 audit[5563]: USER_START pid=5563 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.000000 audit[5565]: CRED_ACQ pid=5565 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.004121 kernel: audit: type=1105 audit(1747355437.997:1547): pid=5563 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.004189 kernel: audit: type=1103 audit(1747355438.000:1548): pid=5565 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.142228 sshd[5563]: pam_unix(sshd:session): session closed for user core May 16 00:30:38.143000 audit[5563]: USER_END pid=5563 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.148475 systemd[1]: sshd@22-10.0.0.9:22-10.0.0.1:56782.service: Deactivated successfully. May 16 00:30:38.143000 audit[5563]: CRED_DISP pid=5563 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.149359 systemd[1]: session-23.scope: Deactivated successfully. May 16 00:30:38.150952 kernel: audit: type=1106 audit(1747355438.143:1549): pid=5563 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.151012 kernel: audit: type=1104 audit(1747355438.143:1550): pid=5563 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:38.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.9:22-10.0.0.1:56782 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:38.154179 systemd-logind[1202]: Session 23 logged out. Waiting for processes to exit. May 16 00:30:38.155342 systemd-logind[1202]: Removed session 23. May 16 00:30:40.927143 kubelet[1969]: E0516 00:30:40.927107 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:30:41.927664 kubelet[1969]: E0516 00:30:41.927632 1969 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:30:43.145975 systemd[1]: Started sshd@23-10.0.0.9:22-10.0.0.1:46904.service. May 16 00:30:43.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.9:22-10.0.0.1:46904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:43.147563 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:30:43.147654 kernel: audit: type=1130 audit(1747355443.144:1552): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.9:22-10.0.0.1:46904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:43.190000 audit[5598]: USER_ACCT pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.192381 sshd[5598]: Accepted publickey for core from 10.0.0.1 port 46904 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:30:43.196206 kernel: audit: type=1101 audit(1747355443.190:1553): pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.196000 audit[5598]: CRED_ACQ pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.197824 sshd[5598]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:30:43.201018 kernel: audit: type=1103 audit(1747355443.196:1554): pid=5598 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.201092 kernel: audit: type=1006 audit(1747355443.196:1555): pid=5598 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 16 00:30:43.196000 audit[5598]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5cc2e40 a2=3 a3=1 items=0 ppid=1 pid=5598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:43.204284 kernel: audit: type=1300 audit(1747355443.196:1555): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5cc2e40 a2=3 a3=1 items=0 ppid=1 pid=5598 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:30:43.196000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:30:43.205247 kernel: audit: type=1327 audit(1747355443.196:1555): proctitle=737368643A20636F7265205B707269765D May 16 00:30:43.207894 systemd-logind[1202]: New session 24 of user core. May 16 00:30:43.208215 systemd[1]: Started session-24.scope. May 16 00:30:43.211000 audit[5598]: USER_START pid=5598 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.216209 kernel: audit: type=1105 audit(1747355443.211:1556): pid=5598 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.215000 audit[5600]: CRED_ACQ pid=5600 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.219184 kernel: audit: type=1103 audit(1747355443.215:1557): pid=5600 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.365163 sshd[5598]: pam_unix(sshd:session): session closed for user core May 16 00:30:43.365000 audit[5598]: USER_END pid=5598 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.367794 systemd[1]: sshd@23-10.0.0.9:22-10.0.0.1:46904.service: Deactivated successfully. May 16 00:30:43.368749 systemd[1]: session-24.scope: Deactivated successfully. May 16 00:30:43.365000 audit[5598]: CRED_DISP pid=5598 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.371150 kernel: audit: type=1106 audit(1747355443.365:1558): pid=5598 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.371256 kernel: audit: type=1104 audit(1747355443.365:1559): pid=5598 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:30:43.371669 systemd-logind[1202]: Session 24 logged out. Waiting for processes to exit. May 16 00:30:43.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.9:22-10.0.0.1:46904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:30:43.372667 systemd-logind[1202]: Removed session 24.