May 16 00:51:51.725938 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] May 16 00:51:51.725956 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Thu May 15 23:21:39 -00 2025 May 16 00:51:51.725964 kernel: efi: EFI v2.70 by EDK II May 16 00:51:51.725970 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 May 16 00:51:51.725975 kernel: random: crng init done May 16 00:51:51.725980 kernel: ACPI: Early table checksum verification disabled May 16 00:51:51.725986 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) May 16 00:51:51.725992 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) May 16 00:51:51.725998 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726003 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726009 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726014 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726019 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726025 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726033 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726039 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726044 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 16 00:51:51.726050 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 May 16 00:51:51.726056 kernel: NUMA: Failed to initialise from firmware May 16 00:51:51.726061 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:51:51.726067 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] May 16 00:51:51.726073 kernel: Zone ranges: May 16 00:51:51.726079 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:51:51.726086 kernel: DMA32 empty May 16 00:51:51.726092 kernel: Normal empty May 16 00:51:51.726097 kernel: Movable zone start for each node May 16 00:51:51.726103 kernel: Early memory node ranges May 16 00:51:51.726108 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] May 16 00:51:51.726114 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] May 16 00:51:51.726119 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] May 16 00:51:51.726125 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] May 16 00:51:51.726131 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] May 16 00:51:51.726136 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] May 16 00:51:51.726142 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] May 16 00:51:51.726147 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] May 16 00:51:51.726154 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges May 16 00:51:51.726160 kernel: psci: probing for conduit method from ACPI. May 16 00:51:51.726165 kernel: psci: PSCIv1.1 detected in firmware. May 16 00:51:51.726171 kernel: psci: Using standard PSCI v0.2 function IDs May 16 00:51:51.726177 kernel: psci: Trusted OS migration not required May 16 00:51:51.726185 kernel: psci: SMC Calling Convention v1.1 May 16 00:51:51.726191 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) May 16 00:51:51.726198 kernel: ACPI: SRAT not present May 16 00:51:51.726204 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 May 16 00:51:51.726210 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 May 16 00:51:51.726217 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 May 16 00:51:51.726223 kernel: Detected PIPT I-cache on CPU0 May 16 00:51:51.726229 kernel: CPU features: detected: GIC system register CPU interface May 16 00:51:51.726235 kernel: CPU features: detected: Hardware dirty bit management May 16 00:51:51.726241 kernel: CPU features: detected: Spectre-v4 May 16 00:51:51.726247 kernel: CPU features: detected: Spectre-BHB May 16 00:51:51.726254 kernel: CPU features: kernel page table isolation forced ON by KASLR May 16 00:51:51.726260 kernel: CPU features: detected: Kernel page table isolation (KPTI) May 16 00:51:51.726266 kernel: CPU features: detected: ARM erratum 1418040 May 16 00:51:51.726272 kernel: CPU features: detected: SSBS not fully self-synchronizing May 16 00:51:51.726278 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 May 16 00:51:51.726284 kernel: Policy zone: DMA May 16 00:51:51.726291 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=2d88e96fdc9dc9b028836e57c250f3fd2abd3e6490e27ecbf72d8b216e3efce8 May 16 00:51:51.726297 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 16 00:51:51.726303 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 16 00:51:51.726309 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 16 00:51:51.726315 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 16 00:51:51.726323 kernel: Memory: 2457340K/2572288K available (9792K kernel code, 2094K rwdata, 7584K rodata, 36480K init, 777K bss, 114948K reserved, 0K cma-reserved) May 16 00:51:51.726329 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 16 00:51:51.726335 kernel: trace event string verifier disabled May 16 00:51:51.726341 kernel: rcu: Preemptible hierarchical RCU implementation. May 16 00:51:51.726347 kernel: rcu: RCU event tracing is enabled. May 16 00:51:51.726353 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 16 00:51:51.726360 kernel: Trampoline variant of Tasks RCU enabled. May 16 00:51:51.726366 kernel: Tracing variant of Tasks RCU enabled. May 16 00:51:51.726372 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 16 00:51:51.726378 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 16 00:51:51.726384 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 May 16 00:51:51.726391 kernel: GICv3: 256 SPIs implemented May 16 00:51:51.726397 kernel: GICv3: 0 Extended SPIs implemented May 16 00:51:51.726403 kernel: GICv3: Distributor has no Range Selector support May 16 00:51:51.726408 kernel: Root IRQ handler: gic_handle_irq May 16 00:51:51.726414 kernel: GICv3: 16 PPIs implemented May 16 00:51:51.726420 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 May 16 00:51:51.726426 kernel: ACPI: SRAT not present May 16 00:51:51.726432 kernel: ITS [mem 0x08080000-0x0809ffff] May 16 00:51:51.726438 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) May 16 00:51:51.726444 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) May 16 00:51:51.726450 kernel: GICv3: using LPI property table @0x00000000400d0000 May 16 00:51:51.726456 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 May 16 00:51:51.726464 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:51:51.726470 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). May 16 00:51:51.726476 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns May 16 00:51:51.726486 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns May 16 00:51:51.726492 kernel: arm-pv: using stolen time PV May 16 00:51:51.726498 kernel: Console: colour dummy device 80x25 May 16 00:51:51.726504 kernel: ACPI: Core revision 20210730 May 16 00:51:51.726510 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) May 16 00:51:51.726516 kernel: pid_max: default: 32768 minimum: 301 May 16 00:51:51.726522 kernel: LSM: Security Framework initializing May 16 00:51:51.726530 kernel: SELinux: Initializing. May 16 00:51:51.726536 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 16 00:51:51.726542 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 16 00:51:51.726549 kernel: ACPI PPTT: PPTT table found, but unable to locate core 3 (3) May 16 00:51:51.726555 kernel: rcu: Hierarchical SRCU implementation. May 16 00:51:51.726561 kernel: Platform MSI: ITS@0x8080000 domain created May 16 00:51:51.726567 kernel: PCI/MSI: ITS@0x8080000 domain created May 16 00:51:51.726573 kernel: Remapping and enabling EFI services. May 16 00:51:51.726579 kernel: smp: Bringing up secondary CPUs ... May 16 00:51:51.726587 kernel: Detected PIPT I-cache on CPU1 May 16 00:51:51.726593 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 May 16 00:51:51.726600 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 May 16 00:51:51.726606 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:51:51.726612 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] May 16 00:51:51.726619 kernel: Detected PIPT I-cache on CPU2 May 16 00:51:51.726625 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 May 16 00:51:51.726631 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 May 16 00:51:51.726637 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:51:51.726643 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] May 16 00:51:51.726651 kernel: Detected PIPT I-cache on CPU3 May 16 00:51:51.726657 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 May 16 00:51:51.726663 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 May 16 00:51:51.726669 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 May 16 00:51:51.726679 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] May 16 00:51:51.726687 kernel: smp: Brought up 1 node, 4 CPUs May 16 00:51:51.726693 kernel: SMP: Total of 4 processors activated. May 16 00:51:51.726700 kernel: CPU features: detected: 32-bit EL0 Support May 16 00:51:51.726707 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence May 16 00:51:51.726722 kernel: CPU features: detected: Common not Private translations May 16 00:51:51.726751 kernel: CPU features: detected: CRC32 instructions May 16 00:51:51.726758 kernel: CPU features: detected: RCpc load-acquire (LDAPR) May 16 00:51:51.726766 kernel: CPU features: detected: LSE atomic instructions May 16 00:51:51.726773 kernel: CPU features: detected: Privileged Access Never May 16 00:51:51.726779 kernel: CPU features: detected: RAS Extension Support May 16 00:51:51.726786 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) May 16 00:51:51.726792 kernel: CPU: All CPU(s) started at EL1 May 16 00:51:51.726800 kernel: alternatives: patching kernel code May 16 00:51:51.726806 kernel: devtmpfs: initialized May 16 00:51:51.726812 kernel: KASLR enabled May 16 00:51:51.726819 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 16 00:51:51.726826 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 16 00:51:51.726832 kernel: pinctrl core: initialized pinctrl subsystem May 16 00:51:51.726839 kernel: SMBIOS 3.0.0 present. May 16 00:51:51.726845 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 May 16 00:51:51.726851 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 16 00:51:51.726859 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations May 16 00:51:51.726866 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations May 16 00:51:51.726878 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations May 16 00:51:51.726885 kernel: audit: initializing netlink subsys (disabled) May 16 00:51:51.726892 kernel: audit: type=2000 audit(0.030:1): state=initialized audit_enabled=0 res=1 May 16 00:51:51.726898 kernel: thermal_sys: Registered thermal governor 'step_wise' May 16 00:51:51.726905 kernel: cpuidle: using governor menu May 16 00:51:51.726911 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. May 16 00:51:51.726918 kernel: ASID allocator initialised with 32768 entries May 16 00:51:51.726926 kernel: ACPI: bus type PCI registered May 16 00:51:51.726932 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 16 00:51:51.726939 kernel: Serial: AMBA PL011 UART driver May 16 00:51:51.726945 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 16 00:51:51.726952 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages May 16 00:51:51.726958 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 16 00:51:51.726965 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages May 16 00:51:51.726971 kernel: cryptd: max_cpu_qlen set to 1000 May 16 00:51:51.726978 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) May 16 00:51:51.726986 kernel: ACPI: Added _OSI(Module Device) May 16 00:51:51.726992 kernel: ACPI: Added _OSI(Processor Device) May 16 00:51:51.726999 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 16 00:51:51.727005 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 16 00:51:51.727012 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 16 00:51:51.727018 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 16 00:51:51.727024 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 16 00:51:51.727031 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 16 00:51:51.727038 kernel: ACPI: Interpreter enabled May 16 00:51:51.727045 kernel: ACPI: Using GIC for interrupt routing May 16 00:51:51.727051 kernel: ACPI: MCFG table detected, 1 entries May 16 00:51:51.727058 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA May 16 00:51:51.727065 kernel: printk: console [ttyAMA0] enabled May 16 00:51:51.727071 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 16 00:51:51.727189 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 16 00:51:51.727252 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] May 16 00:51:51.727313 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] May 16 00:51:51.727370 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 May 16 00:51:51.727427 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] May 16 00:51:51.727441 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] May 16 00:51:51.727448 kernel: PCI host bridge to bus 0000:00 May 16 00:51:51.727518 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] May 16 00:51:51.727571 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] May 16 00:51:51.727644 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] May 16 00:51:51.727707 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 16 00:51:51.727797 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 May 16 00:51:51.727876 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 May 16 00:51:51.727941 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] May 16 00:51:51.728000 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] May 16 00:51:51.728059 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] May 16 00:51:51.728120 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] May 16 00:51:51.728181 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] May 16 00:51:51.728240 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] May 16 00:51:51.728293 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] May 16 00:51:51.728344 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] May 16 00:51:51.728395 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] May 16 00:51:51.728404 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 May 16 00:51:51.728410 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 May 16 00:51:51.728419 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 May 16 00:51:51.728425 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 May 16 00:51:51.728432 kernel: iommu: Default domain type: Translated May 16 00:51:51.728438 kernel: iommu: DMA domain TLB invalidation policy: strict mode May 16 00:51:51.728445 kernel: vgaarb: loaded May 16 00:51:51.728451 kernel: pps_core: LinuxPPS API ver. 1 registered May 16 00:51:51.728458 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 16 00:51:51.728465 kernel: PTP clock support registered May 16 00:51:51.728471 kernel: Registered efivars operations May 16 00:51:51.728479 kernel: clocksource: Switched to clocksource arch_sys_counter May 16 00:51:51.728485 kernel: VFS: Disk quotas dquot_6.6.0 May 16 00:51:51.728492 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 16 00:51:51.728498 kernel: pnp: PnP ACPI init May 16 00:51:51.728562 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved May 16 00:51:51.728571 kernel: pnp: PnP ACPI: found 1 devices May 16 00:51:51.728578 kernel: NET: Registered PF_INET protocol family May 16 00:51:51.728584 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 16 00:51:51.728593 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 16 00:51:51.728599 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 16 00:51:51.728606 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 16 00:51:51.728612 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 16 00:51:51.728619 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 16 00:51:51.728626 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 16 00:51:51.728632 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 16 00:51:51.728639 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 16 00:51:51.728645 kernel: PCI: CLS 0 bytes, default 64 May 16 00:51:51.728653 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available May 16 00:51:51.728660 kernel: kvm [1]: HYP mode not available May 16 00:51:51.728666 kernel: Initialise system trusted keyrings May 16 00:51:51.728673 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 16 00:51:51.728680 kernel: Key type asymmetric registered May 16 00:51:51.728686 kernel: Asymmetric key parser 'x509' registered May 16 00:51:51.728693 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 16 00:51:51.728699 kernel: io scheduler mq-deadline registered May 16 00:51:51.728706 kernel: io scheduler kyber registered May 16 00:51:51.728723 kernel: io scheduler bfq registered May 16 00:51:51.728730 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 May 16 00:51:51.728736 kernel: ACPI: button: Power Button [PWRB] May 16 00:51:51.728743 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 May 16 00:51:51.728804 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) May 16 00:51:51.728813 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 16 00:51:51.728819 kernel: thunder_xcv, ver 1.0 May 16 00:51:51.728826 kernel: thunder_bgx, ver 1.0 May 16 00:51:51.728832 kernel: nicpf, ver 1.0 May 16 00:51:51.728840 kernel: nicvf, ver 1.0 May 16 00:51:51.728913 kernel: rtc-efi rtc-efi.0: registered as rtc0 May 16 00:51:51.730791 kernel: rtc-efi rtc-efi.0: setting system clock to 2025-05-16T00:51:51 UTC (1747356711) May 16 00:51:51.730805 kernel: hid: raw HID events driver (C) Jiri Kosina May 16 00:51:51.730812 kernel: NET: Registered PF_INET6 protocol family May 16 00:51:51.730819 kernel: Segment Routing with IPv6 May 16 00:51:51.730826 kernel: In-situ OAM (IOAM) with IPv6 May 16 00:51:51.730832 kernel: NET: Registered PF_PACKET protocol family May 16 00:51:51.730843 kernel: Key type dns_resolver registered May 16 00:51:51.730850 kernel: registered taskstats version 1 May 16 00:51:51.730856 kernel: Loading compiled-in X.509 certificates May 16 00:51:51.730863 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 2793d535c1de6f1789b22ef06bd5666144f4eeb2' May 16 00:51:51.730870 kernel: Key type .fscrypt registered May 16 00:51:51.730883 kernel: Key type fscrypt-provisioning registered May 16 00:51:51.730890 kernel: ima: No TPM chip found, activating TPM-bypass! May 16 00:51:51.730897 kernel: ima: Allocated hash algorithm: sha1 May 16 00:51:51.730903 kernel: ima: No architecture policies found May 16 00:51:51.730912 kernel: clk: Disabling unused clocks May 16 00:51:51.730918 kernel: Freeing unused kernel memory: 36480K May 16 00:51:51.730925 kernel: Run /init as init process May 16 00:51:51.730931 kernel: with arguments: May 16 00:51:51.730938 kernel: /init May 16 00:51:51.730944 kernel: with environment: May 16 00:51:51.730951 kernel: HOME=/ May 16 00:51:51.730957 kernel: TERM=linux May 16 00:51:51.730964 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 16 00:51:51.730973 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 16 00:51:51.730982 systemd[1]: Detected virtualization kvm. May 16 00:51:51.730989 systemd[1]: Detected architecture arm64. May 16 00:51:51.730996 systemd[1]: Running in initrd. May 16 00:51:51.731003 systemd[1]: No hostname configured, using default hostname. May 16 00:51:51.731010 systemd[1]: Hostname set to . May 16 00:51:51.731017 systemd[1]: Initializing machine ID from VM UUID. May 16 00:51:51.731026 systemd[1]: Queued start job for default target initrd.target. May 16 00:51:51.731033 systemd[1]: Started systemd-ask-password-console.path. May 16 00:51:51.731040 systemd[1]: Reached target cryptsetup.target. May 16 00:51:51.731047 systemd[1]: Reached target paths.target. May 16 00:51:51.731054 systemd[1]: Reached target slices.target. May 16 00:51:51.731060 systemd[1]: Reached target swap.target. May 16 00:51:51.731073 systemd[1]: Reached target timers.target. May 16 00:51:51.731080 systemd[1]: Listening on iscsid.socket. May 16 00:51:51.731089 systemd[1]: Listening on iscsiuio.socket. May 16 00:51:51.731096 systemd[1]: Listening on systemd-journald-audit.socket. May 16 00:51:51.731103 systemd[1]: Listening on systemd-journald-dev-log.socket. May 16 00:51:51.731110 systemd[1]: Listening on systemd-journald.socket. May 16 00:51:51.731116 systemd[1]: Listening on systemd-networkd.socket. May 16 00:51:51.731123 systemd[1]: Listening on systemd-udevd-control.socket. May 16 00:51:51.731130 systemd[1]: Listening on systemd-udevd-kernel.socket. May 16 00:51:51.731137 systemd[1]: Reached target sockets.target. May 16 00:51:51.731145 systemd[1]: Starting kmod-static-nodes.service... May 16 00:51:51.731152 systemd[1]: Finished network-cleanup.service. May 16 00:51:51.731159 systemd[1]: Starting systemd-fsck-usr.service... May 16 00:51:51.731166 systemd[1]: Starting systemd-journald.service... May 16 00:51:51.731173 systemd[1]: Starting systemd-modules-load.service... May 16 00:51:51.731180 systemd[1]: Starting systemd-resolved.service... May 16 00:51:51.731187 systemd[1]: Starting systemd-vconsole-setup.service... May 16 00:51:51.731193 systemd[1]: Finished kmod-static-nodes.service. May 16 00:51:51.731202 systemd[1]: Finished systemd-fsck-usr.service. May 16 00:51:51.731211 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 16 00:51:51.731218 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 16 00:51:51.731226 kernel: audit: type=1130 audit(1747356711.728:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.731235 systemd-journald[290]: Journal started May 16 00:51:51.731281 systemd-journald[290]: Runtime Journal (/run/log/journal/49a8f40d7f7a45b580e5c5c87648b362) is 6.0M, max 48.7M, 42.6M free. May 16 00:51:51.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.721776 systemd-modules-load[291]: Inserted module 'overlay' May 16 00:51:51.732727 systemd[1]: Started systemd-journald.service. May 16 00:51:51.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.733562 systemd[1]: Finished systemd-vconsole-setup.service. May 16 00:51:51.738291 kernel: audit: type=1130 audit(1747356711.733:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.738308 kernel: audit: type=1130 audit(1747356711.734:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.736360 systemd[1]: Starting dracut-cmdline-ask.service... May 16 00:51:51.745961 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 16 00:51:51.747172 systemd-resolved[292]: Positive Trust Anchors: May 16 00:51:51.747186 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 16 00:51:51.749527 kernel: Bridge firewalling registered May 16 00:51:51.747213 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 16 00:51:51.747866 systemd-modules-load[291]: Inserted module 'br_netfilter' May 16 00:51:51.751326 systemd-resolved[292]: Defaulting to hostname 'linux'. May 16 00:51:51.753893 systemd[1]: Started systemd-resolved.service. May 16 00:51:51.755233 systemd[1]: Reached target nss-lookup.target. May 16 00:51:51.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.758739 kernel: audit: type=1130 audit(1747356711.755:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.759739 kernel: SCSI subsystem initialized May 16 00:51:51.763380 systemd[1]: Finished dracut-cmdline-ask.service. May 16 00:51:51.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.766775 systemd[1]: Starting dracut-cmdline.service... May 16 00:51:51.770190 kernel: audit: type=1130 audit(1747356711.764:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.770206 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 16 00:51:51.770216 kernel: device-mapper: uevent: version 1.0.3 May 16 00:51:51.770224 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 16 00:51:51.771781 systemd-modules-load[291]: Inserted module 'dm_multipath' May 16 00:51:51.772533 systemd[1]: Finished systemd-modules-load.service. May 16 00:51:51.773841 systemd[1]: Starting systemd-sysctl.service... May 16 00:51:51.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.776974 dracut-cmdline[308]: dracut-dracut-053 May 16 00:51:51.777739 kernel: audit: type=1130 audit(1747356711.773:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.778557 dracut-cmdline[308]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=2d88e96fdc9dc9b028836e57c250f3fd2abd3e6490e27ecbf72d8b216e3efce8 May 16 00:51:51.784452 systemd[1]: Finished systemd-sysctl.service. May 16 00:51:51.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.787741 kernel: audit: type=1130 audit(1747356711.784:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.834734 kernel: Loading iSCSI transport class v2.0-870. May 16 00:51:51.848746 kernel: iscsi: registered transport (tcp) May 16 00:51:51.862954 kernel: iscsi: registered transport (qla4xxx) May 16 00:51:51.862971 kernel: QLogic iSCSI HBA Driver May 16 00:51:51.896958 systemd[1]: Finished dracut-cmdline.service. May 16 00:51:51.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.898412 systemd[1]: Starting dracut-pre-udev.service... May 16 00:51:51.900785 kernel: audit: type=1130 audit(1747356711.896:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:51.941746 kernel: raid6: neonx8 gen() 13750 MB/s May 16 00:51:51.958728 kernel: raid6: neonx8 xor() 10793 MB/s May 16 00:51:51.975726 kernel: raid6: neonx4 gen() 13551 MB/s May 16 00:51:51.992729 kernel: raid6: neonx4 xor() 11212 MB/s May 16 00:51:52.009725 kernel: raid6: neonx2 gen() 13100 MB/s May 16 00:51:52.026727 kernel: raid6: neonx2 xor() 10233 MB/s May 16 00:51:52.043726 kernel: raid6: neonx1 gen() 10558 MB/s May 16 00:51:52.060724 kernel: raid6: neonx1 xor() 8775 MB/s May 16 00:51:52.077727 kernel: raid6: int64x8 gen() 6268 MB/s May 16 00:51:52.094728 kernel: raid6: int64x8 xor() 3540 MB/s May 16 00:51:52.111723 kernel: raid6: int64x4 gen() 7208 MB/s May 16 00:51:52.128727 kernel: raid6: int64x4 xor() 3851 MB/s May 16 00:51:52.145727 kernel: raid6: int64x2 gen() 6150 MB/s May 16 00:51:52.162726 kernel: raid6: int64x2 xor() 3318 MB/s May 16 00:51:52.179728 kernel: raid6: int64x1 gen() 5041 MB/s May 16 00:51:52.197088 kernel: raid6: int64x1 xor() 2643 MB/s May 16 00:51:52.197103 kernel: raid6: using algorithm neonx8 gen() 13750 MB/s May 16 00:51:52.197112 kernel: raid6: .... xor() 10793 MB/s, rmw enabled May 16 00:51:52.197120 kernel: raid6: using neon recovery algorithm May 16 00:51:52.207734 kernel: xor: measuring software checksum speed May 16 00:51:52.208782 kernel: 8regs : 15895 MB/sec May 16 00:51:52.208799 kernel: 32regs : 20670 MB/sec May 16 00:51:52.209730 kernel: arm64_neon : 27070 MB/sec May 16 00:51:52.209742 kernel: xor: using function: arm64_neon (27070 MB/sec) May 16 00:51:52.269737 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no May 16 00:51:52.280066 systemd[1]: Finished dracut-pre-udev.service. May 16 00:51:52.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:52.282000 audit: BPF prog-id=7 op=LOAD May 16 00:51:52.282000 audit: BPF prog-id=8 op=LOAD May 16 00:51:52.283579 systemd[1]: Starting systemd-udevd.service... May 16 00:51:52.284805 kernel: audit: type=1130 audit(1747356712.280:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:52.295985 systemd-udevd[491]: Using default interface naming scheme 'v252'. May 16 00:51:52.299298 systemd[1]: Started systemd-udevd.service. May 16 00:51:52.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:52.301413 systemd[1]: Starting dracut-pre-trigger.service... May 16 00:51:52.311718 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation May 16 00:51:52.338402 systemd[1]: Finished dracut-pre-trigger.service. May 16 00:51:52.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:52.339790 systemd[1]: Starting systemd-udev-trigger.service... May 16 00:51:52.371194 systemd[1]: Finished systemd-udev-trigger.service. May 16 00:51:52.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:52.410938 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 16 00:51:52.414687 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 16 00:51:52.414702 kernel: GPT:9289727 != 19775487 May 16 00:51:52.414711 kernel: GPT:Alternate GPT header not at the end of the disk. May 16 00:51:52.414732 kernel: GPT:9289727 != 19775487 May 16 00:51:52.414748 kernel: GPT: Use GNU Parted to correct GPT errors. May 16 00:51:52.414757 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:51:52.424739 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (543) May 16 00:51:52.426040 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 16 00:51:52.428874 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 16 00:51:52.429589 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 16 00:51:52.441228 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 16 00:51:52.445412 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 16 00:51:52.446851 systemd[1]: Starting disk-uuid.service... May 16 00:51:52.452788 disk-uuid[562]: Primary Header is updated. May 16 00:51:52.452788 disk-uuid[562]: Secondary Entries is updated. May 16 00:51:52.452788 disk-uuid[562]: Secondary Header is updated. May 16 00:51:52.456743 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:51:53.466566 disk-uuid[563]: The operation has completed successfully. May 16 00:51:53.467889 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 16 00:51:53.490026 systemd[1]: disk-uuid.service: Deactivated successfully. May 16 00:51:53.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.490124 systemd[1]: Finished disk-uuid.service. May 16 00:51:53.491562 systemd[1]: Starting verity-setup.service... May 16 00:51:53.505735 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" May 16 00:51:53.528566 systemd[1]: Found device dev-mapper-usr.device. May 16 00:51:53.530395 systemd[1]: Finished verity-setup.service. May 16 00:51:53.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.531774 systemd[1]: Mounting sysusr-usr.mount... May 16 00:51:53.580738 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 16 00:51:53.581163 systemd[1]: Mounted sysusr-usr.mount. May 16 00:51:53.581901 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 16 00:51:53.582646 systemd[1]: Starting ignition-setup.service... May 16 00:51:53.584937 systemd[1]: Starting parse-ip-for-networkd.service... May 16 00:51:53.591058 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 16 00:51:53.591096 kernel: BTRFS info (device vda6): using free space tree May 16 00:51:53.591106 kernel: BTRFS info (device vda6): has skinny extents May 16 00:51:53.599163 systemd[1]: mnt-oem.mount: Deactivated successfully. May 16 00:51:53.606479 systemd[1]: Finished ignition-setup.service. May 16 00:51:53.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.608019 systemd[1]: Starting ignition-fetch-offline.service... May 16 00:51:53.664738 systemd[1]: Finished parse-ip-for-networkd.service. May 16 00:51:53.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.666000 audit: BPF prog-id=9 op=LOAD May 16 00:51:53.666643 systemd[1]: Starting systemd-networkd.service... May 16 00:51:53.682808 ignition[649]: Ignition 2.14.0 May 16 00:51:53.682818 ignition[649]: Stage: fetch-offline May 16 00:51:53.682852 ignition[649]: no configs at "/usr/lib/ignition/base.d" May 16 00:51:53.682861 ignition[649]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:51:53.682998 ignition[649]: parsed url from cmdline: "" May 16 00:51:53.683001 ignition[649]: no config URL provided May 16 00:51:53.683006 ignition[649]: reading system config file "/usr/lib/ignition/user.ign" May 16 00:51:53.685964 systemd-networkd[741]: lo: Link UP May 16 00:51:53.683013 ignition[649]: no config at "/usr/lib/ignition/user.ign" May 16 00:51:53.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.685967 systemd-networkd[741]: lo: Gained carrier May 16 00:51:53.683028 ignition[649]: op(1): [started] loading QEMU firmware config module May 16 00:51:53.686299 systemd-networkd[741]: Enumeration completed May 16 00:51:53.683033 ignition[649]: op(1): executing: "modprobe" "qemu_fw_cfg" May 16 00:51:53.686473 systemd-networkd[741]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 16 00:51:53.689257 ignition[649]: op(1): [finished] loading QEMU firmware config module May 16 00:51:53.687607 systemd-networkd[741]: eth0: Link UP May 16 00:51:53.687610 systemd-networkd[741]: eth0: Gained carrier May 16 00:51:53.688403 systemd[1]: Started systemd-networkd.service. May 16 00:51:53.689204 systemd[1]: Reached target network.target. May 16 00:51:53.690692 systemd[1]: Starting iscsiuio.service... May 16 00:51:53.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.701421 systemd[1]: Started iscsiuio.service. May 16 00:51:53.702883 systemd[1]: Starting iscsid.service... May 16 00:51:53.706022 iscsid[747]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 16 00:51:53.706022 iscsid[747]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 16 00:51:53.706022 iscsid[747]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 16 00:51:53.706022 iscsid[747]: If using hardware iscsi like qla4xxx this message can be ignored. May 16 00:51:53.706022 iscsid[747]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 16 00:51:53.706022 iscsid[747]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 16 00:51:53.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.708856 systemd[1]: Started iscsid.service. May 16 00:51:53.714366 systemd[1]: Starting dracut-initqueue.service... May 16 00:51:53.714587 systemd-networkd[741]: eth0: DHCPv4 address 10.0.0.134/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 16 00:51:53.724243 systemd[1]: Finished dracut-initqueue.service. May 16 00:51:53.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.725125 systemd[1]: Reached target remote-fs-pre.target. May 16 00:51:53.726414 systemd[1]: Reached target remote-cryptsetup.target. May 16 00:51:53.727937 systemd[1]: Reached target remote-fs.target. May 16 00:51:53.730064 systemd[1]: Starting dracut-pre-mount.service... May 16 00:51:53.737520 systemd[1]: Finished dracut-pre-mount.service. May 16 00:51:53.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.753073 ignition[649]: parsing config with SHA512: d5ce1d0cf1e205ff472deb159ea9c0a89a38dd0a4d91db1080b48286265a9037aa0d4fec6b455adccbe88a1355a4c002f0e795bcfaab73af80eb8077e853b48f May 16 00:51:53.765509 unknown[649]: fetched base config from "system" May 16 00:51:53.765581 unknown[649]: fetched user config from "qemu" May 16 00:51:53.766219 ignition[649]: fetch-offline: fetch-offline passed May 16 00:51:53.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.765634 systemd-resolved[292]: Detected conflict on linux IN A 10.0.0.134 May 16 00:51:53.766280 ignition[649]: Ignition finished successfully May 16 00:51:53.765642 systemd-resolved[292]: Hostname conflict, changing published hostname from 'linux' to 'linux9'. May 16 00:51:53.767287 systemd[1]: Finished ignition-fetch-offline.service. May 16 00:51:53.768607 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 16 00:51:53.769399 systemd[1]: Starting ignition-kargs.service... May 16 00:51:53.778124 ignition[762]: Ignition 2.14.0 May 16 00:51:53.778134 ignition[762]: Stage: kargs May 16 00:51:53.778219 ignition[762]: no configs at "/usr/lib/ignition/base.d" May 16 00:51:53.780397 systemd[1]: Finished ignition-kargs.service. May 16 00:51:53.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.778229 ignition[762]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:51:53.779216 ignition[762]: kargs: kargs passed May 16 00:51:53.782384 systemd[1]: Starting ignition-disks.service... May 16 00:51:53.779253 ignition[762]: Ignition finished successfully May 16 00:51:53.788734 ignition[768]: Ignition 2.14.0 May 16 00:51:53.788744 ignition[768]: Stage: disks May 16 00:51:53.788829 ignition[768]: no configs at "/usr/lib/ignition/base.d" May 16 00:51:53.788838 ignition[768]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:51:53.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.790506 systemd[1]: Finished ignition-disks.service. May 16 00:51:53.789696 ignition[768]: disks: disks passed May 16 00:51:53.791464 systemd[1]: Reached target initrd-root-device.target. May 16 00:51:53.789751 ignition[768]: Ignition finished successfully May 16 00:51:53.792893 systemd[1]: Reached target local-fs-pre.target. May 16 00:51:53.794232 systemd[1]: Reached target local-fs.target. May 16 00:51:53.795325 systemd[1]: Reached target sysinit.target. May 16 00:51:53.796655 systemd[1]: Reached target basic.target. May 16 00:51:53.798681 systemd[1]: Starting systemd-fsck-root.service... May 16 00:51:53.809173 systemd-fsck[776]: ROOT: clean, 619/553520 files, 56022/553472 blocks May 16 00:51:53.812584 systemd[1]: Finished systemd-fsck-root.service. May 16 00:51:53.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.814332 systemd[1]: Mounting sysroot.mount... May 16 00:51:53.820506 systemd[1]: Mounted sysroot.mount. May 16 00:51:53.821572 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 16 00:51:53.821109 systemd[1]: Reached target initrd-root-fs.target. May 16 00:51:53.823107 systemd[1]: Mounting sysroot-usr.mount... May 16 00:51:53.823830 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 16 00:51:53.823865 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 16 00:51:53.823898 systemd[1]: Reached target ignition-diskful.target. May 16 00:51:53.825551 systemd[1]: Mounted sysroot-usr.mount. May 16 00:51:53.827085 systemd[1]: Starting initrd-setup-root.service... May 16 00:51:53.831073 initrd-setup-root[786]: cut: /sysroot/etc/passwd: No such file or directory May 16 00:51:53.834421 initrd-setup-root[794]: cut: /sysroot/etc/group: No such file or directory May 16 00:51:53.838359 initrd-setup-root[802]: cut: /sysroot/etc/shadow: No such file or directory May 16 00:51:53.841520 initrd-setup-root[810]: cut: /sysroot/etc/gshadow: No such file or directory May 16 00:51:53.867404 systemd[1]: Finished initrd-setup-root.service. May 16 00:51:53.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.868853 systemd[1]: Starting ignition-mount.service... May 16 00:51:53.869981 systemd[1]: Starting sysroot-boot.service... May 16 00:51:53.874466 bash[827]: umount: /sysroot/usr/share/oem: not mounted. May 16 00:51:53.882979 ignition[829]: INFO : Ignition 2.14.0 May 16 00:51:53.882979 ignition[829]: INFO : Stage: mount May 16 00:51:53.885212 ignition[829]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:51:53.885212 ignition[829]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:51:53.885212 ignition[829]: INFO : mount: mount passed May 16 00:51:53.885212 ignition[829]: INFO : Ignition finished successfully May 16 00:51:53.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:53.885251 systemd[1]: Finished ignition-mount.service. May 16 00:51:53.890215 systemd[1]: Finished sysroot-boot.service. May 16 00:51:53.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:54.539463 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 16 00:51:54.544736 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (837) May 16 00:51:54.546893 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm May 16 00:51:54.546909 kernel: BTRFS info (device vda6): using free space tree May 16 00:51:54.546918 kernel: BTRFS info (device vda6): has skinny extents May 16 00:51:54.549499 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 16 00:51:54.550907 systemd[1]: Starting ignition-files.service... May 16 00:51:54.564160 ignition[857]: INFO : Ignition 2.14.0 May 16 00:51:54.564160 ignition[857]: INFO : Stage: files May 16 00:51:54.565765 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:51:54.565765 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:51:54.565765 ignition[857]: DEBUG : files: compiled without relabeling support, skipping May 16 00:51:54.569287 ignition[857]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 16 00:51:54.569287 ignition[857]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 16 00:51:54.571991 ignition[857]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 16 00:51:54.571991 ignition[857]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 16 00:51:54.571991 ignition[857]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 16 00:51:54.571991 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-arm64.tar.gz" May 16 00:51:54.571991 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-arm64.tar.gz: attempt #1 May 16 00:51:54.570134 unknown[857]: wrote ssh authorized keys file for user: core May 16 00:51:54.653380 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 16 00:51:54.814830 systemd-networkd[741]: eth0: Gained IPv6LL May 16 00:51:54.888726 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-arm64.tar.gz" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 16 00:51:54.890817 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-arm64.raw: attempt #1 May 16 00:51:55.550636 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 16 00:51:55.966773 ignition[857]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-arm64.raw" May 16 00:51:55.969058 ignition[857]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(f): [started] setting preset to disabled for "coreos-metadata.service" May 16 00:51:55.970414 ignition[857]: INFO : files: op(f): op(10): [started] removing enablement symlink(s) for "coreos-metadata.service" May 16 00:51:56.006686 ignition[857]: INFO : files: op(f): op(10): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 16 00:51:56.007790 ignition[857]: INFO : files: op(f): [finished] setting preset to disabled for "coreos-metadata.service" May 16 00:51:56.007790 ignition[857]: INFO : files: op(11): [started] setting preset to enabled for "prepare-helm.service" May 16 00:51:56.007790 ignition[857]: INFO : files: op(11): [finished] setting preset to enabled for "prepare-helm.service" May 16 00:51:56.007790 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 16 00:51:56.007790 ignition[857]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 16 00:51:56.007790 ignition[857]: INFO : files: files passed May 16 00:51:56.007790 ignition[857]: INFO : Ignition finished successfully May 16 00:51:56.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.008343 systemd[1]: Finished ignition-files.service. May 16 00:51:56.010357 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 16 00:51:56.019550 initrd-setup-root-after-ignition[883]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 16 00:51:56.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.011250 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 16 00:51:56.023151 initrd-setup-root-after-ignition[885]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 16 00:51:56.011890 systemd[1]: Starting ignition-quench.service... May 16 00:51:56.014913 systemd[1]: ignition-quench.service: Deactivated successfully. May 16 00:51:56.014999 systemd[1]: Finished ignition-quench.service. May 16 00:51:56.017833 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 16 00:51:56.018973 systemd[1]: Reached target ignition-complete.target. May 16 00:51:56.020751 systemd[1]: Starting initrd-parse-etc.service... May 16 00:51:56.032219 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 16 00:51:56.032306 systemd[1]: Finished initrd-parse-etc.service. May 16 00:51:56.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.033625 systemd[1]: Reached target initrd-fs.target. May 16 00:51:56.034636 systemd[1]: Reached target initrd.target. May 16 00:51:56.035702 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 16 00:51:56.036372 systemd[1]: Starting dracut-pre-pivot.service... May 16 00:51:56.046076 systemd[1]: Finished dracut-pre-pivot.service. May 16 00:51:56.049653 kernel: kauditd_printk_skb: 29 callbacks suppressed May 16 00:51:56.049673 kernel: audit: type=1130 audit(1747356716.045:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.047410 systemd[1]: Starting initrd-cleanup.service... May 16 00:51:56.055060 systemd[1]: Stopped target nss-lookup.target. May 16 00:51:56.055774 systemd[1]: Stopped target remote-cryptsetup.target. May 16 00:51:56.056945 systemd[1]: Stopped target timers.target. May 16 00:51:56.058031 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 16 00:51:56.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.058135 systemd[1]: Stopped dracut-pre-pivot.service. May 16 00:51:56.062524 kernel: audit: type=1131 audit(1747356716.058:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.059152 systemd[1]: Stopped target initrd.target. May 16 00:51:56.062109 systemd[1]: Stopped target basic.target. May 16 00:51:56.063177 systemd[1]: Stopped target ignition-complete.target. May 16 00:51:56.064332 systemd[1]: Stopped target ignition-diskful.target. May 16 00:51:56.065484 systemd[1]: Stopped target initrd-root-device.target. May 16 00:51:56.066724 systemd[1]: Stopped target remote-fs.target. May 16 00:51:56.067872 systemd[1]: Stopped target remote-fs-pre.target. May 16 00:51:56.069030 systemd[1]: Stopped target sysinit.target. May 16 00:51:56.070030 systemd[1]: Stopped target local-fs.target. May 16 00:51:56.071013 systemd[1]: Stopped target local-fs-pre.target. May 16 00:51:56.072051 systemd[1]: Stopped target swap.target. May 16 00:51:56.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.073014 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 16 00:51:56.077572 kernel: audit: type=1131 audit(1747356716.074:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.073130 systemd[1]: Stopped dracut-pre-mount.service. May 16 00:51:56.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.074219 systemd[1]: Stopped target cryptsetup.target. May 16 00:51:56.083415 kernel: audit: type=1131 audit(1747356716.078:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.083431 kernel: audit: type=1131 audit(1747356716.081:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.077007 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 16 00:51:56.077121 systemd[1]: Stopped dracut-initqueue.service. May 16 00:51:56.078302 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 16 00:51:56.078399 systemd[1]: Stopped ignition-fetch-offline.service. May 16 00:51:56.081218 systemd[1]: Stopped target paths.target. May 16 00:51:56.083995 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 16 00:51:56.088765 systemd[1]: Stopped systemd-ask-password-console.path. May 16 00:51:56.089536 systemd[1]: Stopped target slices.target. May 16 00:51:56.090626 systemd[1]: Stopped target sockets.target. May 16 00:51:56.091672 systemd[1]: iscsid.socket: Deactivated successfully. May 16 00:51:56.091761 systemd[1]: Closed iscsid.socket. May 16 00:51:56.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.092656 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 16 00:51:56.099159 kernel: audit: type=1131 audit(1747356716.093:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.099177 kernel: audit: type=1131 audit(1747356716.095:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.092772 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 16 00:51:56.093900 systemd[1]: ignition-files.service: Deactivated successfully. May 16 00:51:56.093993 systemd[1]: Stopped ignition-files.service. May 16 00:51:56.097597 systemd[1]: Stopping ignition-mount.service... May 16 00:51:56.100051 systemd[1]: Stopping iscsiuio.service... May 16 00:51:56.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.107852 ignition[898]: INFO : Ignition 2.14.0 May 16 00:51:56.107852 ignition[898]: INFO : Stage: umount May 16 00:51:56.107852 ignition[898]: INFO : no configs at "/usr/lib/ignition/base.d" May 16 00:51:56.107852 ignition[898]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 16 00:51:56.107852 ignition[898]: INFO : umount: umount passed May 16 00:51:56.107852 ignition[898]: INFO : Ignition finished successfully May 16 00:51:56.118440 kernel: audit: type=1131 audit(1747356716.104:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.118463 kernel: audit: type=1131 audit(1747356716.107:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.118472 kernel: audit: type=1131 audit(1747356716.110:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.102213 systemd[1]: Stopping sysroot-boot.service... May 16 00:51:56.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.104315 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 16 00:51:56.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.104489 systemd[1]: Stopped systemd-udev-trigger.service. May 16 00:51:56.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.105607 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 16 00:51:56.105746 systemd[1]: Stopped dracut-pre-trigger.service. May 16 00:51:56.110813 systemd[1]: iscsiuio.service: Deactivated successfully. May 16 00:51:56.124000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.110920 systemd[1]: Stopped iscsiuio.service. May 16 00:51:56.112680 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 16 00:51:56.113307 systemd[1]: ignition-mount.service: Deactivated successfully. May 16 00:51:56.113396 systemd[1]: Stopped ignition-mount.service. May 16 00:51:56.116092 systemd[1]: Stopped target network.target. May 16 00:51:56.116824 systemd[1]: iscsiuio.socket: Deactivated successfully. May 16 00:51:56.116859 systemd[1]: Closed iscsiuio.socket. May 16 00:51:56.117873 systemd[1]: ignition-disks.service: Deactivated successfully. May 16 00:51:56.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.117914 systemd[1]: Stopped ignition-disks.service. May 16 00:51:56.119108 systemd[1]: ignition-kargs.service: Deactivated successfully. May 16 00:51:56.119144 systemd[1]: Stopped ignition-kargs.service. May 16 00:51:56.120202 systemd[1]: ignition-setup.service: Deactivated successfully. May 16 00:51:56.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.120241 systemd[1]: Stopped ignition-setup.service. May 16 00:51:56.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.121813 systemd[1]: Stopping systemd-networkd.service... May 16 00:51:56.122727 systemd[1]: Stopping systemd-resolved.service... May 16 00:51:56.145000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.124057 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 16 00:51:56.124141 systemd[1]: Finished initrd-cleanup.service. May 16 00:51:56.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.128791 systemd-networkd[741]: eth0: DHCPv6 lease lost May 16 00:51:56.152000 audit: BPF prog-id=9 op=UNLOAD May 16 00:51:56.129792 systemd[1]: systemd-networkd.service: Deactivated successfully. May 16 00:51:56.129897 systemd[1]: Stopped systemd-networkd.service. May 16 00:51:56.154000 audit: BPF prog-id=6 op=UNLOAD May 16 00:51:56.131125 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 16 00:51:56.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.131153 systemd[1]: Closed systemd-networkd.socket. May 16 00:51:56.133536 systemd[1]: Stopping network-cleanup.service... May 16 00:51:56.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.141219 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 16 00:51:56.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.141274 systemd[1]: Stopped parse-ip-for-networkd.service. May 16 00:51:56.142661 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 16 00:51:56.142701 systemd[1]: Stopped systemd-sysctl.service. May 16 00:51:56.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.145408 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 16 00:51:56.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.145451 systemd[1]: Stopped systemd-modules-load.service. May 16 00:51:56.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.146764 systemd[1]: Stopping systemd-udevd.service... May 16 00:51:56.148676 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 16 00:51:56.149187 systemd[1]: systemd-resolved.service: Deactivated successfully. May 16 00:51:56.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.149317 systemd[1]: Stopped systemd-resolved.service. May 16 00:51:56.170000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.154916 systemd[1]: network-cleanup.service: Deactivated successfully. May 16 00:51:56.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.155006 systemd[1]: Stopped network-cleanup.service. May 16 00:51:56.156090 systemd[1]: sysroot-boot.service: Deactivated successfully. May 16 00:51:56.156166 systemd[1]: Stopped sysroot-boot.service. May 16 00:51:56.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.157585 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 16 00:51:56.157620 systemd[1]: Stopped initrd-setup-root.service. May 16 00:51:56.159007 systemd[1]: systemd-udevd.service: Deactivated successfully. May 16 00:51:56.159114 systemd[1]: Stopped systemd-udevd.service. May 16 00:51:56.160239 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 16 00:51:56.160270 systemd[1]: Closed systemd-udevd-control.socket. May 16 00:51:56.161503 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 16 00:51:56.161534 systemd[1]: Closed systemd-udevd-kernel.socket. May 16 00:51:56.162881 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 16 00:51:56.162921 systemd[1]: Stopped dracut-pre-udev.service. May 16 00:51:56.164220 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 16 00:51:56.164256 systemd[1]: Stopped dracut-cmdline.service. May 16 00:51:56.165418 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 16 00:51:56.165458 systemd[1]: Stopped dracut-cmdline-ask.service. May 16 00:51:56.167478 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 16 00:51:56.168609 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 16 00:51:56.168664 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 16 00:51:56.170818 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 16 00:51:56.170861 systemd[1]: Stopped kmod-static-nodes.service. May 16 00:51:56.171653 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 16 00:51:56.171693 systemd[1]: Stopped systemd-vconsole-setup.service. May 16 00:51:56.173609 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 16 00:51:56.174073 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 16 00:51:56.174148 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 16 00:51:56.175673 systemd[1]: Reached target initrd-switch-root.target. May 16 00:51:56.177519 systemd[1]: Starting initrd-switch-root.service... May 16 00:51:56.183843 systemd[1]: Switching root. May 16 00:51:56.204168 iscsid[747]: iscsid shutting down. May 16 00:51:56.204765 systemd-journald[290]: Received SIGTERM from PID 1 (systemd). May 16 00:51:56.204805 systemd-journald[290]: Journal stopped May 16 00:51:58.212122 kernel: SELinux: Class mctp_socket not defined in policy. May 16 00:51:58.212176 kernel: SELinux: Class anon_inode not defined in policy. May 16 00:51:58.212188 kernel: SELinux: the above unknown classes and permissions will be allowed May 16 00:51:58.212198 kernel: SELinux: policy capability network_peer_controls=1 May 16 00:51:58.212210 kernel: SELinux: policy capability open_perms=1 May 16 00:51:58.212220 kernel: SELinux: policy capability extended_socket_class=1 May 16 00:51:58.212230 kernel: SELinux: policy capability always_check_network=0 May 16 00:51:58.212239 kernel: SELinux: policy capability cgroup_seclabel=1 May 16 00:51:58.212249 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 16 00:51:58.212263 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 16 00:51:58.212273 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 16 00:51:58.212286 systemd[1]: Successfully loaded SELinux policy in 31.974ms. May 16 00:51:58.212307 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.079ms. May 16 00:51:58.212319 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 16 00:51:58.212331 systemd[1]: Detected virtualization kvm. May 16 00:51:58.212343 systemd[1]: Detected architecture arm64. May 16 00:51:58.212354 systemd[1]: Detected first boot. May 16 00:51:58.212365 systemd[1]: Initializing machine ID from VM UUID. May 16 00:51:58.212375 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 16 00:51:58.212386 systemd[1]: Populated /etc with preset unit settings. May 16 00:51:58.212397 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:51:58.212413 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:51:58.212426 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:51:58.212437 systemd[1]: iscsid.service: Deactivated successfully. May 16 00:51:58.212449 systemd[1]: Stopped iscsid.service. May 16 00:51:58.212459 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 16 00:51:58.212471 systemd[1]: Stopped initrd-switch-root.service. May 16 00:51:58.212483 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 16 00:51:58.212515 systemd[1]: Created slice system-addon\x2dconfig.slice. May 16 00:51:58.212527 systemd[1]: Created slice system-addon\x2drun.slice. May 16 00:51:58.212541 systemd[1]: Created slice system-getty.slice. May 16 00:51:58.212551 systemd[1]: Created slice system-modprobe.slice. May 16 00:51:58.212562 systemd[1]: Created slice system-serial\x2dgetty.slice. May 16 00:51:58.212573 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 16 00:51:58.212584 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 16 00:51:58.212596 systemd[1]: Created slice user.slice. May 16 00:51:58.212607 systemd[1]: Started systemd-ask-password-console.path. May 16 00:51:58.212617 systemd[1]: Started systemd-ask-password-wall.path. May 16 00:51:58.212628 systemd[1]: Set up automount boot.automount. May 16 00:51:58.212639 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 16 00:51:58.212650 systemd[1]: Stopped target initrd-switch-root.target. May 16 00:51:58.212662 systemd[1]: Stopped target initrd-fs.target. May 16 00:51:58.212675 systemd[1]: Stopped target initrd-root-fs.target. May 16 00:51:58.212685 systemd[1]: Reached target integritysetup.target. May 16 00:51:58.212696 systemd[1]: Reached target remote-cryptsetup.target. May 16 00:51:58.212706 systemd[1]: Reached target remote-fs.target. May 16 00:51:58.212726 systemd[1]: Reached target slices.target. May 16 00:51:58.212737 systemd[1]: Reached target swap.target. May 16 00:51:58.212748 systemd[1]: Reached target torcx.target. May 16 00:51:58.212758 systemd[1]: Reached target veritysetup.target. May 16 00:51:58.212771 systemd[1]: Listening on systemd-coredump.socket. May 16 00:51:58.212784 systemd[1]: Listening on systemd-initctl.socket. May 16 00:51:58.212799 systemd[1]: Listening on systemd-networkd.socket. May 16 00:51:58.212811 systemd[1]: Listening on systemd-udevd-control.socket. May 16 00:51:58.212822 systemd[1]: Listening on systemd-udevd-kernel.socket. May 16 00:51:58.212833 systemd[1]: Listening on systemd-userdbd.socket. May 16 00:51:58.212844 systemd[1]: Mounting dev-hugepages.mount... May 16 00:51:58.212856 systemd[1]: Mounting dev-mqueue.mount... May 16 00:51:58.212872 systemd[1]: Mounting media.mount... May 16 00:51:58.212883 systemd[1]: Mounting sys-kernel-debug.mount... May 16 00:51:58.212895 systemd[1]: Mounting sys-kernel-tracing.mount... May 16 00:51:58.212907 systemd[1]: Mounting tmp.mount... May 16 00:51:58.212918 systemd[1]: Starting flatcar-tmpfiles.service... May 16 00:51:58.212930 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:51:58.212941 systemd[1]: Starting kmod-static-nodes.service... May 16 00:51:58.212953 systemd[1]: Starting modprobe@configfs.service... May 16 00:51:58.212964 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:51:58.212976 systemd[1]: Starting modprobe@drm.service... May 16 00:51:58.212987 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:51:58.212998 systemd[1]: Starting modprobe@fuse.service... May 16 00:51:58.213010 systemd[1]: Starting modprobe@loop.service... May 16 00:51:58.213022 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 16 00:51:58.213033 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 16 00:51:58.213044 systemd[1]: Stopped systemd-fsck-root.service. May 16 00:51:58.213055 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 16 00:51:58.213066 systemd[1]: Stopped systemd-fsck-usr.service. May 16 00:51:58.213077 systemd[1]: Stopped systemd-journald.service. May 16 00:51:58.213088 systemd[1]: Starting systemd-journald.service... May 16 00:51:58.213098 kernel: loop: module loaded May 16 00:51:58.213110 systemd[1]: Starting systemd-modules-load.service... May 16 00:51:58.213121 systemd[1]: Starting systemd-network-generator.service... May 16 00:51:58.213131 kernel: fuse: init (API version 7.34) May 16 00:51:58.213142 systemd[1]: Starting systemd-remount-fs.service... May 16 00:51:58.213152 systemd[1]: Starting systemd-udev-trigger.service... May 16 00:51:58.213163 systemd[1]: verity-setup.service: Deactivated successfully. May 16 00:51:58.213173 systemd[1]: Stopped verity-setup.service. May 16 00:51:58.213185 systemd[1]: Mounted dev-hugepages.mount. May 16 00:51:58.213195 systemd[1]: Mounted dev-mqueue.mount. May 16 00:51:58.213207 systemd[1]: Mounted media.mount. May 16 00:51:58.213218 systemd[1]: Mounted sys-kernel-debug.mount. May 16 00:51:58.213231 systemd[1]: Mounted sys-kernel-tracing.mount. May 16 00:51:58.213244 systemd[1]: Mounted tmp.mount. May 16 00:51:58.213254 systemd[1]: Finished kmod-static-nodes.service. May 16 00:51:58.213266 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 16 00:51:58.213279 systemd[1]: Finished modprobe@configfs.service. May 16 00:51:58.213291 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:51:58.213302 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:51:58.213314 systemd[1]: modprobe@drm.service: Deactivated successfully. May 16 00:51:58.213326 systemd[1]: Finished modprobe@drm.service. May 16 00:51:58.213337 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:51:58.213348 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:51:58.213359 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 16 00:51:58.213374 systemd-journald[993]: Journal started May 16 00:51:58.213416 systemd-journald[993]: Runtime Journal (/run/log/journal/49a8f40d7f7a45b580e5c5c87648b362) is 6.0M, max 48.7M, 42.6M free. May 16 00:51:56.272000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 16 00:51:56.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 16 00:51:56.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 16 00:51:56.361000 audit: BPF prog-id=10 op=LOAD May 16 00:51:56.361000 audit: BPF prog-id=10 op=UNLOAD May 16 00:51:56.361000 audit: BPF prog-id=11 op=LOAD May 16 00:51:56.361000 audit: BPF prog-id=11 op=UNLOAD May 16 00:51:56.398000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 16 00:51:56.398000 audit[931]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400017b8cc a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.398000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 16 00:51:56.400000 audit[931]: AVC avc: denied { associate } for pid=931 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 16 00:51:56.400000 audit[931]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=400017b9a5 a2=1ed a3=0 items=2 ppid=914 pid=931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:56.400000 audit: CWD cwd="/" May 16 00:51:56.400000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.400000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:51:56.400000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 16 00:51:58.067000 audit: BPF prog-id=12 op=LOAD May 16 00:51:58.067000 audit: BPF prog-id=3 op=UNLOAD May 16 00:51:58.067000 audit: BPF prog-id=13 op=LOAD May 16 00:51:58.067000 audit: BPF prog-id=14 op=LOAD May 16 00:51:58.067000 audit: BPF prog-id=4 op=UNLOAD May 16 00:51:58.067000 audit: BPF prog-id=5 op=UNLOAD May 16 00:51:58.068000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.077000 audit: BPF prog-id=12 op=UNLOAD May 16 00:51:58.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.171000 audit: BPF prog-id=15 op=LOAD May 16 00:51:58.171000 audit: BPF prog-id=16 op=LOAD May 16 00:51:58.171000 audit: BPF prog-id=17 op=LOAD May 16 00:51:58.171000 audit: BPF prog-id=13 op=UNLOAD May 16 00:51:58.171000 audit: BPF prog-id=14 op=UNLOAD May 16 00:51:58.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.204000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.204000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.210000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 16 00:51:58.210000 audit[993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffe0fcc450 a2=4000 a3=1 items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:58.210000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 16 00:51:58.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.065993 systemd[1]: Queued start job for default target multi-user.target. May 16 00:51:56.398066 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:51:58.066005 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 16 00:51:56.398370 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 16 00:51:58.068960 systemd[1]: systemd-journald.service: Deactivated successfully. May 16 00:51:56.398389 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 16 00:51:56.398419 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 16 00:51:56.398428 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="skipped missing lower profile" missing profile=oem May 16 00:51:56.398457 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 16 00:51:56.398468 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 16 00:51:56.398672 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 16 00:51:56.398705 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 16 00:51:56.398735 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 16 00:51:56.399160 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 16 00:51:56.399192 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 16 00:51:58.215974 systemd[1]: Finished modprobe@fuse.service. May 16 00:51:56.399209 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 16 00:51:58.215000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:56.399223 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 16 00:51:56.399240 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 16 00:51:56.399255 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:56Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 16 00:51:57.822335 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:57Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:51:57.822590 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:57Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:51:57.822689 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:57Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:51:57.822882 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:57Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 16 00:51:57.822938 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:57Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 16 00:51:57.822992 /usr/lib/systemd/system-generators/torcx-generator[931]: time="2025-05-16T00:51:57Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 16 00:51:58.216753 systemd[1]: Started systemd-journald.service. May 16 00:51:58.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.217985 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:51:58.218148 systemd[1]: Finished modprobe@loop.service. May 16 00:51:58.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.219081 systemd[1]: Finished systemd-modules-load.service. May 16 00:51:58.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.220084 systemd[1]: Finished systemd-network-generator.service. May 16 00:51:58.220000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.221233 systemd[1]: Finished systemd-remount-fs.service. May 16 00:51:58.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.222579 systemd[1]: Reached target network-pre.target. May 16 00:51:58.225586 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 16 00:51:58.227569 systemd[1]: Mounting sys-kernel-config.mount... May 16 00:51:58.228414 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 16 00:51:58.230362 systemd[1]: Starting systemd-hwdb-update.service... May 16 00:51:58.232279 systemd[1]: Starting systemd-journal-flush.service... May 16 00:51:58.233271 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:51:58.234214 systemd[1]: Starting systemd-random-seed.service... May 16 00:51:58.235103 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:51:58.236098 systemd[1]: Starting systemd-sysctl.service... May 16 00:51:58.239370 systemd[1]: Finished flatcar-tmpfiles.service. May 16 00:51:58.239876 systemd-journald[993]: Time spent on flushing to /var/log/journal/49a8f40d7f7a45b580e5c5c87648b362 is 22.127ms for 991 entries. May 16 00:51:58.239876 systemd-journald[993]: System Journal (/var/log/journal/49a8f40d7f7a45b580e5c5c87648b362) is 8.0M, max 195.6M, 187.6M free. May 16 00:51:58.266480 systemd-journald[993]: Received client request to flush runtime journal. May 16 00:51:58.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.249000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.241228 systemd[1]: Finished systemd-udev-trigger.service. May 16 00:51:58.242213 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 16 00:51:58.266990 udevadm[1038]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 16 00:51:58.243424 systemd[1]: Mounted sys-kernel-config.mount. May 16 00:51:58.245361 systemd[1]: Starting systemd-sysusers.service... May 16 00:51:58.247205 systemd[1]: Starting systemd-udev-settle.service... May 16 00:51:58.249371 systemd[1]: Finished systemd-random-seed.service. May 16 00:51:58.250248 systemd[1]: Reached target first-boot-complete.target. May 16 00:51:58.255515 systemd[1]: Finished systemd-sysctl.service. May 16 00:51:58.264337 systemd[1]: Finished systemd-sysusers.service. May 16 00:51:58.266354 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 16 00:51:58.267842 systemd[1]: Finished systemd-journal-flush.service. May 16 00:51:58.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.287253 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 16 00:51:58.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.625859 systemd[1]: Finished systemd-hwdb-update.service. May 16 00:51:58.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.626000 audit: BPF prog-id=18 op=LOAD May 16 00:51:58.626000 audit: BPF prog-id=19 op=LOAD May 16 00:51:58.626000 audit: BPF prog-id=7 op=UNLOAD May 16 00:51:58.626000 audit: BPF prog-id=8 op=UNLOAD May 16 00:51:58.627834 systemd[1]: Starting systemd-udevd.service... May 16 00:51:58.646248 systemd-udevd[1042]: Using default interface naming scheme 'v252'. May 16 00:51:58.658493 systemd[1]: Started systemd-udevd.service. May 16 00:51:58.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.661000 audit: BPF prog-id=20 op=LOAD May 16 00:51:58.663272 systemd[1]: Starting systemd-networkd.service... May 16 00:51:58.682578 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. May 16 00:51:58.700000 audit: BPF prog-id=21 op=LOAD May 16 00:51:58.700000 audit: BPF prog-id=22 op=LOAD May 16 00:51:58.700000 audit: BPF prog-id=23 op=LOAD May 16 00:51:58.701858 systemd[1]: Starting systemd-userdbd.service... May 16 00:51:58.729946 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 16 00:51:58.744325 systemd[1]: Started systemd-userdbd.service. May 16 00:51:58.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.771452 systemd[1]: Finished systemd-udev-settle.service. May 16 00:51:58.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.773694 systemd[1]: Starting lvm2-activation-early.service... May 16 00:51:58.785459 lvm[1074]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 16 00:51:58.795098 systemd-networkd[1047]: lo: Link UP May 16 00:51:58.795110 systemd-networkd[1047]: lo: Gained carrier May 16 00:51:58.795439 systemd-networkd[1047]: Enumeration completed May 16 00:51:58.795540 systemd[1]: Started systemd-networkd.service. May 16 00:51:58.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.796666 systemd-networkd[1047]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 16 00:51:58.797839 systemd-networkd[1047]: eth0: Link UP May 16 00:51:58.797844 systemd-networkd[1047]: eth0: Gained carrier May 16 00:51:58.832780 systemd[1]: Finished lvm2-activation-early.service. May 16 00:51:58.832923 systemd-networkd[1047]: eth0: DHCPv4 address 10.0.0.134/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 16 00:51:58.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.833802 systemd[1]: Reached target cryptsetup.target. May 16 00:51:58.835801 systemd[1]: Starting lvm2-activation.service... May 16 00:51:58.839515 lvm[1076]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 16 00:51:58.880641 systemd[1]: Finished lvm2-activation.service. May 16 00:51:58.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.881677 systemd[1]: Reached target local-fs-pre.target. May 16 00:51:58.882576 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 16 00:51:58.882608 systemd[1]: Reached target local-fs.target. May 16 00:51:58.883490 systemd[1]: Reached target machines.target. May 16 00:51:58.885639 systemd[1]: Starting ldconfig.service... May 16 00:51:58.886747 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:51:58.886803 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:51:58.887905 systemd[1]: Starting systemd-boot-update.service... May 16 00:51:58.890045 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 16 00:51:58.892296 systemd[1]: Starting systemd-machine-id-commit.service... May 16 00:51:58.894916 systemd[1]: Starting systemd-sysext.service... May 16 00:51:58.897133 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1078 (bootctl) May 16 00:51:58.898259 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 16 00:51:58.906792 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 16 00:51:58.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.917143 systemd[1]: Unmounting usr-share-oem.mount... May 16 00:51:58.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.965484 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 16 00:51:58.965679 systemd[1]: Unmounted usr-share-oem.mount. May 16 00:51:58.967306 systemd[1]: Finished systemd-machine-id-commit.service. May 16 00:51:58.977467 systemd-fsck[1085]: fsck.fat 4.2 (2021-01-31) May 16 00:51:58.977467 systemd-fsck[1085]: /dev/vda1: 236 files, 117310/258078 clusters May 16 00:51:58.979183 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 16 00:51:58.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:58.981733 kernel: loop0: detected capacity change from 0 to 211168 May 16 00:51:58.994077 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 16 00:51:59.061738 kernel: loop1: detected capacity change from 0 to 211168 May 16 00:51:59.065270 ldconfig[1077]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 16 00:51:59.066086 (sd-sysext)[1090]: Using extensions 'kubernetes'. May 16 00:51:59.066615 (sd-sysext)[1090]: Merged extensions into '/usr'. May 16 00:51:59.068911 systemd[1]: Finished ldconfig.service. May 16 00:51:59.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.081912 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:51:59.083072 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:51:59.084626 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:51:59.086273 systemd[1]: Starting modprobe@loop.service... May 16 00:51:59.086877 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:51:59.087003 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:51:59.087709 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:51:59.087862 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:51:59.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.087000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.088827 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:51:59.088941 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:51:59.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.089929 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:51:59.090033 systemd[1]: Finished modprobe@loop.service. May 16 00:51:59.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.090974 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:51:59.091077 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:51:59.193125 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 16 00:51:59.194973 systemd[1]: Mounting boot.mount... May 16 00:51:59.196749 systemd[1]: Mounting usr-share-oem.mount... May 16 00:51:59.203502 systemd[1]: Mounted boot.mount. May 16 00:51:59.204309 systemd[1]: Mounted usr-share-oem.mount. May 16 00:51:59.206032 systemd[1]: Finished systemd-sysext.service. May 16 00:51:59.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.207952 systemd[1]: Starting ensure-sysext.service... May 16 00:51:59.209732 systemd[1]: Starting systemd-tmpfiles-setup.service... May 16 00:51:59.210940 systemd[1]: Finished systemd-boot-update.service. May 16 00:51:59.210000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.215041 systemd[1]: Reloading. May 16 00:51:59.219619 systemd-tmpfiles[1098]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 16 00:51:59.220371 systemd-tmpfiles[1098]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 16 00:51:59.221691 systemd-tmpfiles[1098]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 16 00:51:59.252509 /usr/lib/systemd/system-generators/torcx-generator[1119]: time="2025-05-16T00:51:59Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:51:59.252545 /usr/lib/systemd/system-generators/torcx-generator[1119]: time="2025-05-16T00:51:59Z" level=info msg="torcx already run" May 16 00:51:59.315849 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:51:59.315876 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:51:59.331132 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:51:59.372000 audit: BPF prog-id=24 op=LOAD May 16 00:51:59.372000 audit: BPF prog-id=25 op=LOAD May 16 00:51:59.372000 audit: BPF prog-id=18 op=UNLOAD May 16 00:51:59.372000 audit: BPF prog-id=19 op=UNLOAD May 16 00:51:59.372000 audit: BPF prog-id=26 op=LOAD May 16 00:51:59.372000 audit: BPF prog-id=21 op=UNLOAD May 16 00:51:59.372000 audit: BPF prog-id=27 op=LOAD May 16 00:51:59.372000 audit: BPF prog-id=28 op=LOAD May 16 00:51:59.372000 audit: BPF prog-id=22 op=UNLOAD May 16 00:51:59.372000 audit: BPF prog-id=23 op=UNLOAD May 16 00:51:59.375000 audit: BPF prog-id=29 op=LOAD May 16 00:51:59.375000 audit: BPF prog-id=15 op=UNLOAD May 16 00:51:59.375000 audit: BPF prog-id=30 op=LOAD May 16 00:51:59.375000 audit: BPF prog-id=31 op=LOAD May 16 00:51:59.375000 audit: BPF prog-id=16 op=UNLOAD May 16 00:51:59.375000 audit: BPF prog-id=17 op=UNLOAD May 16 00:51:59.375000 audit: BPF prog-id=32 op=LOAD May 16 00:51:59.375000 audit: BPF prog-id=20 op=UNLOAD May 16 00:51:59.378166 systemd[1]: Finished systemd-tmpfiles-setup.service. May 16 00:51:59.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.382811 systemd[1]: Starting audit-rules.service... May 16 00:51:59.385026 systemd[1]: Starting clean-ca-certificates.service... May 16 00:51:59.387459 systemd[1]: Starting systemd-journal-catalog-update.service... May 16 00:51:59.391000 audit: BPF prog-id=33 op=LOAD May 16 00:51:59.393824 systemd[1]: Starting systemd-resolved.service... May 16 00:51:59.398000 audit: BPF prog-id=34 op=LOAD May 16 00:51:59.400660 systemd[1]: Starting systemd-timesyncd.service... May 16 00:51:59.404470 systemd[1]: Starting systemd-update-utmp.service... May 16 00:51:59.409473 systemd[1]: Finished clean-ca-certificates.service. May 16 00:51:59.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.410000 audit[1167]: SYSTEM_BOOT pid=1167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 16 00:51:59.412305 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:51:59.413962 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:51:59.416671 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:51:59.419212 systemd[1]: Starting modprobe@loop.service... May 16 00:51:59.419898 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:51:59.420118 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:51:59.420348 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:51:59.421698 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:51:59.421954 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:51:59.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.422000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.423175 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:51:59.423336 systemd[1]: Finished modprobe@loop.service. May 16 00:51:59.423000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.424555 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:51:59.424670 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:51:59.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.427969 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:51:59.429691 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:51:59.432006 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:51:59.434892 systemd[1]: Starting modprobe@loop.service... May 16 00:51:59.435500 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:51:59.435628 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:51:59.435739 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:51:59.436705 systemd[1]: Finished systemd-journal-catalog-update.service. May 16 00:51:59.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.438014 systemd[1]: Finished systemd-update-utmp.service. May 16 00:51:59.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.439117 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:51:59.439615 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:51:59.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.440883 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:51:59.441051 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:51:59.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.442252 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:51:59.442368 systemd[1]: Finished modprobe@loop.service. May 16 00:51:59.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.442000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.447078 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 16 00:51:59.449120 systemd[1]: Starting modprobe@dm_mod.service... May 16 00:51:59.451326 systemd[1]: Starting modprobe@drm.service... May 16 00:51:59.453425 systemd[1]: Starting modprobe@efi_pstore.service... May 16 00:51:59.455668 systemd[1]: Starting modprobe@loop.service... May 16 00:51:59.456602 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 16 00:51:59.456782 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:51:59.458320 systemd[1]: Starting systemd-networkd-wait-online.service... May 16 00:51:59.460852 systemd[1]: Starting systemd-update-done.service... May 16 00:51:59.461855 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 16 00:51:59.463407 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 16 00:51:59.463581 systemd[1]: Finished modprobe@dm_mod.service. May 16 00:51:59.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.464803 systemd[1]: modprobe@drm.service: Deactivated successfully. May 16 00:51:59.464933 systemd[1]: Finished modprobe@drm.service. May 16 00:51:59.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.465982 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 16 00:51:59.466095 systemd[1]: Finished modprobe@efi_pstore.service. May 16 00:51:59.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.467342 systemd[1]: modprobe@loop.service: Deactivated successfully. May 16 00:51:59.467478 systemd[1]: Finished modprobe@loop.service. May 16 00:51:59.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.469827 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 16 00:51:59.469954 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 16 00:51:59.475188 systemd[1]: Finished ensure-sysext.service. May 16 00:51:59.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.482035 systemd[1]: Finished systemd-update-done.service. May 16 00:51:59.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:51:59.482000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 16 00:51:59.482000 audit[1190]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc75c2850 a2=420 a3=0 items=0 ppid=1158 pid=1190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:51:59.482000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 16 00:51:59.483636 systemd-resolved[1162]: Positive Trust Anchors: May 16 00:51:59.483643 systemd-resolved[1162]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 16 00:51:59.483671 systemd-resolved[1162]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 16 00:51:59.484147 augenrules[1190]: No rules May 16 00:51:59.485027 systemd[1]: Finished audit-rules.service. May 16 00:51:59.488563 systemd[1]: Started systemd-timesyncd.service. May 16 00:51:59.489434 systemd[1]: Reached target time-set.target. May 16 00:51:59.490524 systemd-timesyncd[1163]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 16 00:51:59.490584 systemd-timesyncd[1163]: Initial clock synchronization to Fri 2025-05-16 00:51:59.611204 UTC. May 16 00:51:59.495112 systemd-resolved[1162]: Defaulting to hostname 'linux'. May 16 00:51:59.496484 systemd[1]: Started systemd-resolved.service. May 16 00:51:59.497152 systemd[1]: Reached target network.target. May 16 00:51:59.497705 systemd[1]: Reached target nss-lookup.target. May 16 00:51:59.498296 systemd[1]: Reached target sysinit.target. May 16 00:51:59.498950 systemd[1]: Started motdgen.path. May 16 00:51:59.499464 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 16 00:51:59.500420 systemd[1]: Started logrotate.timer. May 16 00:51:59.501051 systemd[1]: Started mdadm.timer. May 16 00:51:59.501533 systemd[1]: Started systemd-tmpfiles-clean.timer. May 16 00:51:59.502176 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 16 00:51:59.502205 systemd[1]: Reached target paths.target. May 16 00:51:59.502741 systemd[1]: Reached target timers.target. May 16 00:51:59.503567 systemd[1]: Listening on dbus.socket. May 16 00:51:59.505243 systemd[1]: Starting docker.socket... May 16 00:51:59.508498 systemd[1]: Listening on sshd.socket. May 16 00:51:59.509265 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:51:59.509893 systemd[1]: Listening on docker.socket. May 16 00:51:59.510554 systemd[1]: Reached target sockets.target. May 16 00:51:59.511199 systemd[1]: Reached target basic.target. May 16 00:51:59.511785 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 16 00:51:59.511815 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 16 00:51:59.512793 systemd[1]: Starting containerd.service... May 16 00:51:59.514426 systemd[1]: Starting dbus.service... May 16 00:51:59.516145 systemd[1]: Starting enable-oem-cloudinit.service... May 16 00:51:59.518106 systemd[1]: Starting extend-filesystems.service... May 16 00:51:59.518897 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 16 00:51:59.520314 systemd[1]: Starting motdgen.service... May 16 00:51:59.522185 systemd[1]: Starting prepare-helm.service... May 16 00:51:59.523931 systemd[1]: Starting ssh-key-proc-cmdline.service... May 16 00:51:59.526400 systemd[1]: Starting sshd-keygen.service... May 16 00:51:59.529552 systemd[1]: Starting systemd-logind.service... May 16 00:51:59.530422 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 16 00:51:59.530512 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 16 00:51:59.530963 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 16 00:51:59.531689 systemd[1]: Starting update-engine.service... May 16 00:51:59.534201 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 16 00:51:59.537837 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 16 00:51:59.538131 systemd[1]: Finished ssh-key-proc-cmdline.service. May 16 00:51:59.539003 jq[1200]: false May 16 00:51:59.545994 jq[1214]: true May 16 00:51:59.549186 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 16 00:51:59.549367 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 16 00:51:59.556982 jq[1223]: true May 16 00:51:59.560830 systemd[1]: motdgen.service: Deactivated successfully. May 16 00:51:59.561007 systemd[1]: Finished motdgen.service. May 16 00:51:59.565581 tar[1218]: linux-arm64/LICENSE May 16 00:51:59.565581 tar[1218]: linux-arm64/helm May 16 00:51:59.575013 extend-filesystems[1201]: Found loop1 May 16 00:51:59.575749 extend-filesystems[1201]: Found vda May 16 00:51:59.575749 extend-filesystems[1201]: Found vda1 May 16 00:51:59.575749 extend-filesystems[1201]: Found vda2 May 16 00:51:59.575749 extend-filesystems[1201]: Found vda3 May 16 00:51:59.575749 extend-filesystems[1201]: Found usr May 16 00:51:59.575749 extend-filesystems[1201]: Found vda4 May 16 00:51:59.575749 extend-filesystems[1201]: Found vda6 May 16 00:51:59.575749 extend-filesystems[1201]: Found vda7 May 16 00:51:59.575749 extend-filesystems[1201]: Found vda9 May 16 00:51:59.575749 extend-filesystems[1201]: Checking size of /dev/vda9 May 16 00:51:59.579540 dbus-daemon[1199]: [system] SELinux support is enabled May 16 00:51:59.581518 systemd[1]: Started dbus.service. May 16 00:51:59.583972 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 16 00:51:59.584004 systemd[1]: Reached target system-config.target. May 16 00:51:59.584655 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 16 00:51:59.584668 systemd[1]: Reached target user-config.target. May 16 00:51:59.604586 systemd-logind[1209]: Watching system buttons on /dev/input/event0 (Power Button) May 16 00:51:59.605090 systemd-logind[1209]: New seat seat0. May 16 00:51:59.608416 extend-filesystems[1201]: Resized partition /dev/vda9 May 16 00:51:59.610278 systemd[1]: Started systemd-logind.service. May 16 00:51:59.624955 extend-filesystems[1250]: resize2fs 1.46.5 (30-Dec-2021) May 16 00:51:59.630754 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 16 00:51:59.633523 update_engine[1212]: I0516 00:51:59.633149 1212 main.cc:92] Flatcar Update Engine starting May 16 00:51:59.650116 update_engine[1212]: I0516 00:51:59.640053 1212 update_check_scheduler.cc:74] Next update check in 2m37s May 16 00:51:59.636571 systemd[1]: Started update-engine.service. May 16 00:51:59.639040 systemd[1]: Started locksmithd.service. May 16 00:51:59.656914 bash[1246]: Updated "/home/core/.ssh/authorized_keys" May 16 00:51:59.657939 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 16 00:51:59.665893 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 16 00:51:59.680816 extend-filesystems[1250]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 16 00:51:59.680816 extend-filesystems[1250]: old_desc_blocks = 1, new_desc_blocks = 1 May 16 00:51:59.680816 extend-filesystems[1250]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 16 00:51:59.686073 extend-filesystems[1201]: Resized filesystem in /dev/vda9 May 16 00:51:59.686747 env[1219]: time="2025-05-16T00:51:59.684283400Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 16 00:51:59.686168 systemd[1]: extend-filesystems.service: Deactivated successfully. May 16 00:51:59.686323 systemd[1]: Finished extend-filesystems.service. May 16 00:51:59.707843 env[1219]: time="2025-05-16T00:51:59.706945440Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 16 00:51:59.707843 env[1219]: time="2025-05-16T00:51:59.707097560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 16 00:51:59.709753 env[1219]: time="2025-05-16T00:51:59.709519360Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 16 00:51:59.709753 env[1219]: time="2025-05-16T00:51:59.709698080Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 16 00:51:59.710127 env[1219]: time="2025-05-16T00:51:59.710085800Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 16 00:51:59.710127 env[1219]: time="2025-05-16T00:51:59.710110200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 16 00:51:59.710127 env[1219]: time="2025-05-16T00:51:59.710124040Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 16 00:51:59.710201 env[1219]: time="2025-05-16T00:51:59.710134320Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 16 00:51:59.710227 env[1219]: time="2025-05-16T00:51:59.710217840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 16 00:51:59.710567 env[1219]: time="2025-05-16T00:51:59.710513120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 16 00:51:59.710697 env[1219]: time="2025-05-16T00:51:59.710656240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 16 00:51:59.710753 env[1219]: time="2025-05-16T00:51:59.710696560Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 16 00:51:59.710918 env[1219]: time="2025-05-16T00:51:59.710846800Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 16 00:51:59.710918 env[1219]: time="2025-05-16T00:51:59.710878440Z" level=info msg="metadata content store policy set" policy=shared May 16 00:51:59.714471 env[1219]: time="2025-05-16T00:51:59.714440040Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 16 00:51:59.714547 env[1219]: time="2025-05-16T00:51:59.714483680Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 16 00:51:59.714547 env[1219]: time="2025-05-16T00:51:59.714537360Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 16 00:51:59.714603 env[1219]: time="2025-05-16T00:51:59.714585080Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 16 00:51:59.714653 env[1219]: time="2025-05-16T00:51:59.714608200Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 16 00:51:59.714695 env[1219]: time="2025-05-16T00:51:59.714624000Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 16 00:51:59.714739 env[1219]: time="2025-05-16T00:51:59.714694600Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 16 00:51:59.715162 env[1219]: time="2025-05-16T00:51:59.715131120Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 16 00:51:59.715226 env[1219]: time="2025-05-16T00:51:59.715164080Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 16 00:51:59.715300 env[1219]: time="2025-05-16T00:51:59.715276840Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 16 00:51:59.715341 env[1219]: time="2025-05-16T00:51:59.715297920Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 16 00:51:59.715341 env[1219]: time="2025-05-16T00:51:59.715312640Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 16 00:51:59.715453 env[1219]: time="2025-05-16T00:51:59.715428560Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 16 00:51:59.715530 env[1219]: time="2025-05-16T00:51:59.715510600Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 16 00:51:59.715920 env[1219]: time="2025-05-16T00:51:59.715881520Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 16 00:51:59.715920 env[1219]: time="2025-05-16T00:51:59.715916920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716058 env[1219]: time="2025-05-16T00:51:59.715931840Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 16 00:51:59.716058 env[1219]: time="2025-05-16T00:51:59.716036840Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716058 env[1219]: time="2025-05-16T00:51:59.716052040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716120 env[1219]: time="2025-05-16T00:51:59.716063880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716120 env[1219]: time="2025-05-16T00:51:59.716075560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716120 env[1219]: time="2025-05-16T00:51:59.716087600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716120 env[1219]: time="2025-05-16T00:51:59.716099440Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716120 env[1219]: time="2025-05-16T00:51:59.716109920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716209 env[1219]: time="2025-05-16T00:51:59.716121520Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716209 env[1219]: time="2025-05-16T00:51:59.716133960Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 16 00:51:59.716281 env[1219]: time="2025-05-16T00:51:59.716257680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716311 env[1219]: time="2025-05-16T00:51:59.716282080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716311 env[1219]: time="2025-05-16T00:51:59.716302400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716365 env[1219]: time="2025-05-16T00:51:59.716314280Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 16 00:51:59.716365 env[1219]: time="2025-05-16T00:51:59.716328760Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 16 00:51:59.716365 env[1219]: time="2025-05-16T00:51:59.716339400Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 16 00:51:59.716365 env[1219]: time="2025-05-16T00:51:59.716356040Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 16 00:51:59.716443 env[1219]: time="2025-05-16T00:51:59.716388040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 16 00:51:59.716609 locksmithd[1251]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 16 00:51:59.716855 env[1219]: time="2025-05-16T00:51:59.716609880Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 16 00:51:59.716855 env[1219]: time="2025-05-16T00:51:59.716664120Z" level=info msg="Connect containerd service" May 16 00:51:59.716855 env[1219]: time="2025-05-16T00:51:59.716692000Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.717525000Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.717785040Z" level=info msg="Start subscribing containerd event" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.717824760Z" level=info msg="Start recovering state" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.717890080Z" level=info msg="Start event monitor" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.717914120Z" level=info msg="Start snapshots syncer" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.717922840Z" level=info msg="Start cni network conf syncer for default" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.717929760Z" level=info msg="Start streaming server" May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.718362840Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.718400600Z" level=info msg=serving... address=/run/containerd/containerd.sock May 16 00:51:59.719511 env[1219]: time="2025-05-16T00:51:59.718479880Z" level=info msg="containerd successfully booted in 0.044815s" May 16 00:51:59.718574 systemd[1]: Started containerd.service. May 16 00:51:59.986738 tar[1218]: linux-arm64/README.md May 16 00:51:59.991145 systemd[1]: Finished prepare-helm.service. May 16 00:52:00.191243 systemd-networkd[1047]: eth0: Gained IPv6LL May 16 00:52:00.192986 systemd[1]: Finished systemd-networkd-wait-online.service. May 16 00:52:00.193989 systemd[1]: Reached target network-online.target. May 16 00:52:00.196126 systemd[1]: Starting kubelet.service... May 16 00:52:00.782886 systemd[1]: Started kubelet.service. May 16 00:52:01.210850 kubelet[1267]: E0516 00:52:01.210789 1267 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:52:01.213047 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:52:01.213175 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:52:01.438037 sshd_keygen[1217]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 16 00:52:01.455979 systemd[1]: Finished sshd-keygen.service. May 16 00:52:01.458015 systemd[1]: Starting issuegen.service... May 16 00:52:01.462508 systemd[1]: issuegen.service: Deactivated successfully. May 16 00:52:01.462660 systemd[1]: Finished issuegen.service. May 16 00:52:01.464679 systemd[1]: Starting systemd-user-sessions.service... May 16 00:52:01.470375 systemd[1]: Finished systemd-user-sessions.service. May 16 00:52:01.472309 systemd[1]: Started getty@tty1.service. May 16 00:52:01.474184 systemd[1]: Started serial-getty@ttyAMA0.service. May 16 00:52:01.475044 systemd[1]: Reached target getty.target. May 16 00:52:01.475686 systemd[1]: Reached target multi-user.target. May 16 00:52:01.477482 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 16 00:52:01.483558 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 16 00:52:01.483707 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 16 00:52:01.484575 systemd[1]: Startup finished in 561ms (kernel) + 4.665s (initrd) + 5.249s (userspace) = 10.476s. May 16 00:52:04.627400 systemd[1]: Created slice system-sshd.slice. May 16 00:52:04.628778 systemd[1]: Started sshd@0-10.0.0.134:22-10.0.0.1:51174.service. May 16 00:52:04.675853 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 51174 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:04.677844 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:04.687569 systemd[1]: Created slice user-500.slice. May 16 00:52:04.688735 systemd[1]: Starting user-runtime-dir@500.service... May 16 00:52:04.690478 systemd-logind[1209]: New session 1 of user core. May 16 00:52:04.696886 systemd[1]: Finished user-runtime-dir@500.service. May 16 00:52:04.698355 systemd[1]: Starting user@500.service... May 16 00:52:04.701214 (systemd)[1292]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:04.762537 systemd[1292]: Queued start job for default target default.target. May 16 00:52:04.763066 systemd[1292]: Reached target paths.target. May 16 00:52:04.763099 systemd[1292]: Reached target sockets.target. May 16 00:52:04.763111 systemd[1292]: Reached target timers.target. May 16 00:52:04.763121 systemd[1292]: Reached target basic.target. May 16 00:52:04.763163 systemd[1292]: Reached target default.target. May 16 00:52:04.763187 systemd[1292]: Startup finished in 55ms. May 16 00:52:04.763261 systemd[1]: Started user@500.service. May 16 00:52:04.764287 systemd[1]: Started session-1.scope. May 16 00:52:04.817650 systemd[1]: Started sshd@1-10.0.0.134:22-10.0.0.1:51184.service. May 16 00:52:04.856131 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 51184 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:04.857621 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:04.861795 systemd-logind[1209]: New session 2 of user core. May 16 00:52:04.862113 systemd[1]: Started session-2.scope. May 16 00:52:04.915333 sshd[1301]: pam_unix(sshd:session): session closed for user core May 16 00:52:04.919354 systemd[1]: Started sshd@2-10.0.0.134:22-10.0.0.1:51192.service. May 16 00:52:04.920288 systemd-logind[1209]: Session 2 logged out. Waiting for processes to exit. May 16 00:52:04.920454 systemd[1]: sshd@1-10.0.0.134:22-10.0.0.1:51184.service: Deactivated successfully. May 16 00:52:04.921058 systemd[1]: session-2.scope: Deactivated successfully. May 16 00:52:04.921627 systemd-logind[1209]: Removed session 2. May 16 00:52:04.958887 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 51192 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:04.960156 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:04.963317 systemd-logind[1209]: New session 3 of user core. May 16 00:52:04.964133 systemd[1]: Started session-3.scope. May 16 00:52:05.014465 sshd[1306]: pam_unix(sshd:session): session closed for user core May 16 00:52:05.017040 systemd[1]: sshd@2-10.0.0.134:22-10.0.0.1:51192.service: Deactivated successfully. May 16 00:52:05.017634 systemd[1]: session-3.scope: Deactivated successfully. May 16 00:52:05.018161 systemd-logind[1209]: Session 3 logged out. Waiting for processes to exit. May 16 00:52:05.019278 systemd[1]: Started sshd@3-10.0.0.134:22-10.0.0.1:51206.service. May 16 00:52:05.019950 systemd-logind[1209]: Removed session 3. May 16 00:52:05.057788 sshd[1313]: Accepted publickey for core from 10.0.0.1 port 51206 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:05.059021 sshd[1313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:05.062374 systemd-logind[1209]: New session 4 of user core. May 16 00:52:05.063207 systemd[1]: Started session-4.scope. May 16 00:52:05.117085 sshd[1313]: pam_unix(sshd:session): session closed for user core May 16 00:52:05.119467 systemd[1]: sshd@3-10.0.0.134:22-10.0.0.1:51206.service: Deactivated successfully. May 16 00:52:05.120055 systemd[1]: session-4.scope: Deactivated successfully. May 16 00:52:05.120537 systemd-logind[1209]: Session 4 logged out. Waiting for processes to exit. May 16 00:52:05.121597 systemd[1]: Started sshd@4-10.0.0.134:22-10.0.0.1:51210.service. May 16 00:52:05.122392 systemd-logind[1209]: Removed session 4. May 16 00:52:05.160785 sshd[1319]: Accepted publickey for core from 10.0.0.1 port 51210 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:05.162035 sshd[1319]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:05.165371 systemd-logind[1209]: New session 5 of user core. May 16 00:52:05.166176 systemd[1]: Started session-5.scope. May 16 00:52:05.228659 sudo[1322]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 16 00:52:05.228916 sudo[1322]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:52:05.240930 dbus-daemon[1199]: avc: received setenforce notice (enforcing=1) May 16 00:52:05.242683 sudo[1322]: pam_unix(sudo:session): session closed for user root May 16 00:52:05.244972 sshd[1319]: pam_unix(sshd:session): session closed for user core May 16 00:52:05.248920 systemd[1]: Started sshd@5-10.0.0.134:22-10.0.0.1:51220.service. May 16 00:52:05.249443 systemd[1]: sshd@4-10.0.0.134:22-10.0.0.1:51210.service: Deactivated successfully. May 16 00:52:05.250089 systemd[1]: session-5.scope: Deactivated successfully. May 16 00:52:05.250660 systemd-logind[1209]: Session 5 logged out. Waiting for processes to exit. May 16 00:52:05.251650 systemd-logind[1209]: Removed session 5. May 16 00:52:05.288861 sshd[1325]: Accepted publickey for core from 10.0.0.1 port 51220 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:05.290227 sshd[1325]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:05.293644 systemd-logind[1209]: New session 6 of user core. May 16 00:52:05.294493 systemd[1]: Started session-6.scope. May 16 00:52:05.347602 sudo[1330]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 16 00:52:05.348140 sudo[1330]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:52:05.351001 sudo[1330]: pam_unix(sudo:session): session closed for user root May 16 00:52:05.356013 sudo[1329]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 16 00:52:05.356230 sudo[1329]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:52:05.365040 systemd[1]: Stopping audit-rules.service... May 16 00:52:05.364000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 16 00:52:05.366410 auditctl[1333]: No rules May 16 00:52:05.366672 systemd[1]: audit-rules.service: Deactivated successfully. May 16 00:52:05.366759 kernel: kauditd_printk_skb: 166 callbacks suppressed May 16 00:52:05.366783 kernel: audit: type=1305 audit(1747356725.364:205): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 16 00:52:05.366856 systemd[1]: Stopped audit-rules.service. May 16 00:52:05.364000 audit[1333]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc71bc910 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.368301 systemd[1]: Starting audit-rules.service... May 16 00:52:05.370761 kernel: audit: type=1300 audit(1747356725.364:205): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc71bc910 a2=420 a3=0 items=0 ppid=1 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.364000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 16 00:52:05.372183 kernel: audit: type=1327 audit(1747356725.364:205): proctitle=2F7362696E2F617564697463746C002D44 May 16 00:52:05.372210 kernel: audit: type=1131 audit(1747356725.365:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:05.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:05.386874 augenrules[1350]: No rules May 16 00:52:05.387611 systemd[1]: Finished audit-rules.service. May 16 00:52:05.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:05.389263 sudo[1329]: pam_unix(sudo:session): session closed for user root May 16 00:52:05.388000 audit[1329]: USER_END pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:05.392253 kernel: audit: type=1130 audit(1747356725.387:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:05.392305 kernel: audit: type=1106 audit(1747356725.388:208): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:05.388000 audit[1329]: CRED_DISP pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:05.392879 sshd[1325]: pam_unix(sshd:session): session closed for user core May 16 00:52:05.396468 kernel: audit: type=1104 audit(1747356725.388:209): pid=1329 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:05.396521 kernel: audit: type=1106 audit(1747356725.393:210): pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.393000 audit[1325]: USER_END pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.396626 systemd[1]: Started sshd@6-10.0.0.134:22-10.0.0.1:51228.service. May 16 00:52:05.397211 systemd[1]: sshd@5-10.0.0.134:22-10.0.0.1:51220.service: Deactivated successfully. May 16 00:52:05.397703 kernel: audit: type=1104 audit(1747356725.393:211): pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.393000 audit[1325]: CRED_DISP pid=1325 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.397968 systemd[1]: session-6.scope: Deactivated successfully. May 16 00:52:05.398557 systemd-logind[1209]: Session 6 logged out. Waiting for processes to exit. May 16 00:52:05.399508 systemd-logind[1209]: Removed session 6. May 16 00:52:05.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.134:22-10.0.0.1:51228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:05.402038 kernel: audit: type=1130 audit(1747356725.396:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.134:22-10.0.0.1:51228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:05.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.134:22-10.0.0.1:51220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:05.434000 audit[1355]: USER_ACCT pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.435426 sshd[1355]: Accepted publickey for core from 10.0.0.1 port 51228 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:52:05.435000 audit[1355]: CRED_ACQ pid=1355 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.435000 audit[1355]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe667c820 a2=3 a3=1 items=0 ppid=1 pid=1355 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.435000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:52:05.436416 sshd[1355]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:52:05.439902 systemd-logind[1209]: New session 7 of user core. May 16 00:52:05.440283 systemd[1]: Started session-7.scope. May 16 00:52:05.443000 audit[1355]: USER_START pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.444000 audit[1359]: CRED_ACQ pid=1359 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:05.489000 audit[1360]: USER_ACCT pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:05.491779 sudo[1360]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 16 00:52:05.490000 audit[1360]: CRED_REFR pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:05.492014 sudo[1360]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 16 00:52:05.491000 audit[1360]: USER_START pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:05.553302 systemd[1]: Starting docker.service... May 16 00:52:05.636863 env[1371]: time="2025-05-16T00:52:05.636791818Z" level=info msg="Starting up" May 16 00:52:05.638370 env[1371]: time="2025-05-16T00:52:05.638342169Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 16 00:52:05.638370 env[1371]: time="2025-05-16T00:52:05.638364742Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 16 00:52:05.638465 env[1371]: time="2025-05-16T00:52:05.638386066Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 16 00:52:05.638465 env[1371]: time="2025-05-16T00:52:05.638396466Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 16 00:52:05.640438 env[1371]: time="2025-05-16T00:52:05.640414288Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 16 00:52:05.640513 env[1371]: time="2025-05-16T00:52:05.640499422Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 16 00:52:05.640585 env[1371]: time="2025-05-16T00:52:05.640568392Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 16 00:52:05.640635 env[1371]: time="2025-05-16T00:52:05.640622649Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 16 00:52:05.644892 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3295856269-merged.mount: Deactivated successfully. May 16 00:52:05.779941 env[1371]: time="2025-05-16T00:52:05.779897641Z" level=info msg="Loading containers: start." May 16 00:52:05.828000 audit[1404]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.828000 audit[1404]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc00acb70 a2=0 a3=1 items=0 ppid=1371 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.828000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 16 00:52:05.830000 audit[1406]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.830000 audit[1406]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffedacd600 a2=0 a3=1 items=0 ppid=1371 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.830000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 16 00:52:05.831000 audit[1408]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.831000 audit[1408]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffe6621b0 a2=0 a3=1 items=0 ppid=1371 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 16 00:52:05.833000 audit[1410]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.833000 audit[1410]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc46e9750 a2=0 a3=1 items=0 ppid=1371 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.833000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 16 00:52:05.835000 audit[1412]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.835000 audit[1412]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd8555030 a2=0 a3=1 items=0 ppid=1371 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.835000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 16 00:52:05.863000 audit[1417]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.863000 audit[1417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffed475a10 a2=0 a3=1 items=0 ppid=1371 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.863000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 16 00:52:05.869000 audit[1419]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.869000 audit[1419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc8332040 a2=0 a3=1 items=0 ppid=1371 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.869000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 16 00:52:05.870000 audit[1421]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.870000 audit[1421]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff5e21ac0 a2=0 a3=1 items=0 ppid=1371 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 16 00:52:05.872000 audit[1423]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.872000 audit[1423]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffdc8a1080 a2=0 a3=1 items=0 ppid=1371 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.872000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:52:05.878000 audit[1427]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.878000 audit[1427]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe8a259c0 a2=0 a3=1 items=0 ppid=1371 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.878000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 16 00:52:05.887000 audit[1428]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.887000 audit[1428]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffea659220 a2=0 a3=1 items=0 ppid=1371 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.887000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:52:05.897744 kernel: Initializing XFRM netlink socket May 16 00:52:05.920252 env[1371]: time="2025-05-16T00:52:05.920212140Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 16 00:52:05.936000 audit[1436]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.936000 audit[1436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc3a11530 a2=0 a3=1 items=0 ppid=1371 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.936000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 16 00:52:05.950000 audit[1439]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.950000 audit[1439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe082aca0 a2=0 a3=1 items=0 ppid=1371 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.950000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 16 00:52:05.953000 audit[1442]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.953000 audit[1442]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffeb6ea1e0 a2=0 a3=1 items=0 ppid=1371 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.953000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 16 00:52:05.955000 audit[1444]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.955000 audit[1444]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcff4c2c0 a2=0 a3=1 items=0 ppid=1371 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 16 00:52:05.957000 audit[1446]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1446 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.957000 audit[1446]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe49409a0 a2=0 a3=1 items=0 ppid=1371 pid=1446 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 16 00:52:05.959000 audit[1448]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.959000 audit[1448]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd44025d0 a2=0 a3=1 items=0 ppid=1371 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.959000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 16 00:52:05.960000 audit[1450]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.960000 audit[1450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffde7e5670 a2=0 a3=1 items=0 ppid=1371 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.960000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 16 00:52:05.969000 audit[1453]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1453 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.969000 audit[1453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffd92db5a0 a2=0 a3=1 items=0 ppid=1371 pid=1453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 16 00:52:05.971000 audit[1455]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.971000 audit[1455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe4c77260 a2=0 a3=1 items=0 ppid=1371 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 16 00:52:05.972000 audit[1457]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1457 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.972000 audit[1457]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffc7bdfa20 a2=0 a3=1 items=0 ppid=1371 pid=1457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.972000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 16 00:52:05.974000 audit[1459]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1459 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.974000 audit[1459]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff87c8f20 a2=0 a3=1 items=0 ppid=1371 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 16 00:52:05.975881 systemd-networkd[1047]: docker0: Link UP May 16 00:52:05.982000 audit[1463]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1463 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.982000 audit[1463]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd7fd29d0 a2=0 a3=1 items=0 ppid=1371 pid=1463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 16 00:52:05.991000 audit[1464]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1464 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:05.991000 audit[1464]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffd932150 a2=0 a3=1 items=0 ppid=1371 pid=1464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:05.991000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 16 00:52:05.993911 env[1371]: time="2025-05-16T00:52:05.993872159Z" level=info msg="Loading containers: done." May 16 00:52:06.015748 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3225225364-merged.mount: Deactivated successfully. May 16 00:52:06.026835 env[1371]: time="2025-05-16T00:52:06.026798007Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 16 00:52:06.027187 env[1371]: time="2025-05-16T00:52:06.027162620Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 16 00:52:06.027358 env[1371]: time="2025-05-16T00:52:06.027339611Z" level=info msg="Daemon has completed initialization" May 16 00:52:06.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:06.045841 systemd[1]: Started docker.service. May 16 00:52:06.053310 env[1371]: time="2025-05-16T00:52:06.053202314Z" level=info msg="API listen on /run/docker.sock" May 16 00:52:06.630351 env[1219]: time="2025-05-16T00:52:06.630100303Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\"" May 16 00:52:07.346209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2251063708.mount: Deactivated successfully. May 16 00:52:08.729544 env[1219]: time="2025-05-16T00:52:08.729490585Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.730968 env[1219]: time="2025-05-16T00:52:08.730932707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9a2b7cf4f8540534c6ec5b758462c6d7885c6e734652172078bba899c0e3089a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.732663 env[1219]: time="2025-05-16T00:52:08.732636779Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.734307 env[1219]: time="2025-05-16T00:52:08.734281144Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:d8ae2fb01c39aa1c7add84f3d54425cf081c24c11e3946830292a8cfa4293548,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:08.735183 env[1219]: time="2025-05-16T00:52:08.735149947Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\" returns image reference \"sha256:9a2b7cf4f8540534c6ec5b758462c6d7885c6e734652172078bba899c0e3089a\"" May 16 00:52:08.738427 env[1219]: time="2025-05-16T00:52:08.738402851Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\"" May 16 00:52:10.337080 env[1219]: time="2025-05-16T00:52:10.337023720Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.338122 env[1219]: time="2025-05-16T00:52:10.338095720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:674996a72aa5900cbbbcd410437021fa4c62a7f829a56f58eb23ac430f2ae383,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.339926 env[1219]: time="2025-05-16T00:52:10.339891783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.341783 env[1219]: time="2025-05-16T00:52:10.341756599Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:7c9bea694e3a3c01ed6a5ee02d55a6124cc08e0b2eec6caa33f2c396b8cbc3f8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:10.342639 env[1219]: time="2025-05-16T00:52:10.342603750Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\" returns image reference \"sha256:674996a72aa5900cbbbcd410437021fa4c62a7f829a56f58eb23ac430f2ae383\"" May 16 00:52:10.343184 env[1219]: time="2025-05-16T00:52:10.343156577Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\"" May 16 00:52:11.444134 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 16 00:52:11.444311 systemd[1]: Stopped kubelet.service. May 16 00:52:11.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.445803 systemd[1]: Starting kubelet.service... May 16 00:52:11.447566 kernel: kauditd_printk_skb: 84 callbacks suppressed May 16 00:52:11.447639 kernel: audit: type=1130 audit(1747356731.443:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.447664 kernel: audit: type=1131 audit(1747356731.443:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.553043 systemd[1]: Started kubelet.service. May 16 00:52:11.555743 kernel: audit: type=1130 audit(1747356731.552:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:11.592222 kubelet[1506]: E0516 00:52:11.592173 1506 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:52:11.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:52:11.595366 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:52:11.595495 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:52:11.597745 kernel: audit: type=1131 audit(1747356731.595:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:52:11.920261 env[1219]: time="2025-05-16T00:52:11.920115561Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:11.921377 env[1219]: time="2025-05-16T00:52:11.921306124Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014094c90caacf743dc5fb4281363492da1df31cd8218aeceab3be3326277d2e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:11.923392 env[1219]: time="2025-05-16T00:52:11.923358470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:11.925278 env[1219]: time="2025-05-16T00:52:11.925227743Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:395b7de7cdbdcc3c3a3db270844a3f71d757e2447a1e4db76b4cce46fba7fd55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:11.926073 env[1219]: time="2025-05-16T00:52:11.926041601Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\" returns image reference \"sha256:014094c90caacf743dc5fb4281363492da1df31cd8218aeceab3be3326277d2e\"" May 16 00:52:11.926774 env[1219]: time="2025-05-16T00:52:11.926585805Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 16 00:52:13.124584 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2822797971.mount: Deactivated successfully. May 16 00:52:13.718368 env[1219]: time="2025-05-16T00:52:13.718279626Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:13.719700 env[1219]: time="2025-05-16T00:52:13.719656479Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e58848989f556e36aa29d7852ab1712163960651e074d11cae9d31fb27192db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:13.720844 env[1219]: time="2025-05-16T00:52:13.720816236Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:13.722370 env[1219]: time="2025-05-16T00:52:13.722339156Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:13.723570 env[1219]: time="2025-05-16T00:52:13.723535891Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:3e58848989f556e36aa29d7852ab1712163960651e074d11cae9d31fb27192db\"" May 16 00:52:13.724372 env[1219]: time="2025-05-16T00:52:13.724346081Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" May 16 00:52:14.272861 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3788748800.mount: Deactivated successfully. May 16 00:52:15.447249 env[1219]: time="2025-05-16T00:52:15.447198053Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.449678 env[1219]: time="2025-05-16T00:52:15.449639776Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f72407be9e08c3a1b29a88318cbfee87b9f2da489f84015a5090b1e386e4dbc1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.454492 env[1219]: time="2025-05-16T00:52:15.454450274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.456456 env[1219]: time="2025-05-16T00:52:15.456405889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.458449 env[1219]: time="2025-05-16T00:52:15.458417418Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:f72407be9e08c3a1b29a88318cbfee87b9f2da489f84015a5090b1e386e4dbc1\"" May 16 00:52:15.458978 env[1219]: time="2025-05-16T00:52:15.458950942Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 16 00:52:15.939549 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3195405136.mount: Deactivated successfully. May 16 00:52:15.943711 env[1219]: time="2025-05-16T00:52:15.943668624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.945368 env[1219]: time="2025-05-16T00:52:15.945325873Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.947148 env[1219]: time="2025-05-16T00:52:15.947119158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.948561 env[1219]: time="2025-05-16T00:52:15.948514634Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:15.949051 env[1219]: time="2025-05-16T00:52:15.949021665Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" May 16 00:52:15.950109 env[1219]: time="2025-05-16T00:52:15.950078092Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" May 16 00:52:19.063512 env[1219]: time="2025-05-16T00:52:19.063449791Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:19.065747 env[1219]: time="2025-05-16T00:52:19.065702878Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:31747a36ce712f0bf61b50a0c06e99768522025e7b8daedd6dc63d1ae84837b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:19.068130 env[1219]: time="2025-05-16T00:52:19.068098935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:19.070297 env[1219]: time="2025-05-16T00:52:19.070265679Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:19.071046 env[1219]: time="2025-05-16T00:52:19.071009006Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:31747a36ce712f0bf61b50a0c06e99768522025e7b8daedd6dc63d1ae84837b5\"" May 16 00:52:21.694231 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 16 00:52:21.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:21.694408 systemd[1]: Stopped kubelet.service. May 16 00:52:21.695821 systemd[1]: Starting kubelet.service... May 16 00:52:21.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:21.698070 kernel: audit: type=1130 audit(1747356741.693:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:21.698125 kernel: audit: type=1131 audit(1747356741.693:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:21.796276 systemd[1]: Started kubelet.service. May 16 00:52:21.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:21.798730 kernel: audit: type=1130 audit(1747356741.795:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:21.828240 kubelet[1541]: E0516 00:52:21.828206 1541 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 16 00:52:21.830452 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 16 00:52:21.830581 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 16 00:52:21.830000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:52:21.832729 kernel: audit: type=1131 audit(1747356741.830:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 16 00:52:23.816671 systemd[1]: Stopped kubelet.service. May 16 00:52:23.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:23.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:23.818690 systemd[1]: Starting kubelet.service... May 16 00:52:23.820465 kernel: audit: type=1130 audit(1747356743.815:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:23.820525 kernel: audit: type=1131 audit(1747356743.815:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:23.840395 systemd[1]: Reloading. May 16 00:52:23.879368 /usr/lib/systemd/system-generators/torcx-generator[1576]: time="2025-05-16T00:52:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:52:23.879399 /usr/lib/systemd/system-generators/torcx-generator[1576]: time="2025-05-16T00:52:23Z" level=info msg="torcx already run" May 16 00:52:24.010195 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:52:24.010214 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:52:24.025462 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:52:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076700 kernel: audit: type=1400 audit(1747356744.072:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076756 kernel: audit: type=1400 audit(1747356744.072:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076775 kernel: audit: type=1400 audit(1747356744.072:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.080230 kernel: audit: type=1400 audit(1747356744.072:260): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.074000 audit: BPF prog-id=40 op=LOAD May 16 00:52:24.074000 audit: BPF prog-id=38 op=UNLOAD May 16 00:52:24.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.074000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.075000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.075000 audit: BPF prog-id=41 op=LOAD May 16 00:52:24.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.077000 audit: BPF prog-id=42 op=LOAD May 16 00:52:24.077000 audit: BPF prog-id=24 op=UNLOAD May 16 00:52:24.077000 audit: BPF prog-id=25 op=UNLOAD May 16 00:52:24.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit: BPF prog-id=43 op=LOAD May 16 00:52:24.079000 audit: BPF prog-id=26 op=UNLOAD May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit: BPF prog-id=44 op=LOAD May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.079000 audit: BPF prog-id=45 op=LOAD May 16 00:52:24.079000 audit: BPF prog-id=27 op=UNLOAD May 16 00:52:24.079000 audit: BPF prog-id=28 op=UNLOAD May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit: BPF prog-id=46 op=LOAD May 16 00:52:24.081000 audit: BPF prog-id=33 op=UNLOAD May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.081000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit: BPF prog-id=47 op=LOAD May 16 00:52:24.082000 audit: BPF prog-id=35 op=UNLOAD May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit: BPF prog-id=48 op=LOAD May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.082000 audit: BPF prog-id=49 op=LOAD May 16 00:52:24.082000 audit: BPF prog-id=36 op=UNLOAD May 16 00:52:24.082000 audit: BPF prog-id=37 op=UNLOAD May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit: BPF prog-id=50 op=LOAD May 16 00:52:24.083000 audit: BPF prog-id=29 op=UNLOAD May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit: BPF prog-id=51 op=LOAD May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.083000 audit: BPF prog-id=52 op=LOAD May 16 00:52:24.083000 audit: BPF prog-id=30 op=UNLOAD May 16 00:52:24.083000 audit: BPF prog-id=31 op=UNLOAD May 16 00:52:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.084000 audit: BPF prog-id=53 op=LOAD May 16 00:52:24.084000 audit: BPF prog-id=34 op=UNLOAD May 16 00:52:24.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:24.085000 audit: BPF prog-id=54 op=LOAD May 16 00:52:24.085000 audit: BPF prog-id=32 op=UNLOAD May 16 00:52:24.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:24.095065 systemd[1]: Started kubelet.service. May 16 00:52:24.098175 systemd[1]: Stopping kubelet.service... May 16 00:52:24.098454 systemd[1]: kubelet.service: Deactivated successfully. May 16 00:52:24.098698 systemd[1]: Stopped kubelet.service. May 16 00:52:24.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:24.100172 systemd[1]: Starting kubelet.service... May 16 00:52:24.191343 systemd[1]: Started kubelet.service. May 16 00:52:24.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:24.226675 kubelet[1621]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:52:24.226675 kubelet[1621]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 16 00:52:24.226675 kubelet[1621]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:52:24.227034 kubelet[1621]: I0516 00:52:24.226709 1621 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 16 00:52:25.403069 kubelet[1621]: I0516 00:52:25.403025 1621 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 16 00:52:25.403069 kubelet[1621]: I0516 00:52:25.403056 1621 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 16 00:52:25.403443 kubelet[1621]: I0516 00:52:25.403312 1621 server.go:956] "Client rotation is on, will bootstrap in background" May 16 00:52:25.446373 kubelet[1621]: E0516 00:52:25.446334 1621 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.0.0.134:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 16 00:52:25.447557 kubelet[1621]: I0516 00:52:25.447538 1621 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 16 00:52:25.456814 kubelet[1621]: E0516 00:52:25.456779 1621 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 16 00:52:25.456928 kubelet[1621]: I0516 00:52:25.456913 1621 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 16 00:52:25.461251 kubelet[1621]: I0516 00:52:25.461229 1621 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 16 00:52:25.462583 kubelet[1621]: I0516 00:52:25.462545 1621 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 16 00:52:25.462852 kubelet[1621]: I0516 00:52:25.462678 1621 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 16 00:52:25.463045 kubelet[1621]: I0516 00:52:25.463030 1621 topology_manager.go:138] "Creating topology manager with none policy" May 16 00:52:25.463106 kubelet[1621]: I0516 00:52:25.463097 1621 container_manager_linux.go:303] "Creating device plugin manager" May 16 00:52:25.463331 kubelet[1621]: I0516 00:52:25.463317 1621 state_mem.go:36] "Initialized new in-memory state store" May 16 00:52:25.467856 kubelet[1621]: I0516 00:52:25.467831 1621 kubelet.go:480] "Attempting to sync node with API server" May 16 00:52:25.467965 kubelet[1621]: I0516 00:52:25.467952 1621 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 16 00:52:25.468054 kubelet[1621]: I0516 00:52:25.468042 1621 kubelet.go:386] "Adding apiserver pod source" May 16 00:52:25.470693 kubelet[1621]: I0516 00:52:25.470673 1621 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 16 00:52:25.472345 kubelet[1621]: I0516 00:52:25.472319 1621 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 16 00:52:25.473031 kubelet[1621]: I0516 00:52:25.473006 1621 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 16 00:52:25.473143 kubelet[1621]: W0516 00:52:25.473126 1621 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 16 00:52:25.474826 kubelet[1621]: E0516 00:52:25.474797 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.0.0.134:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 16 00:52:25.475197 kubelet[1621]: I0516 00:52:25.475161 1621 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 16 00:52:25.475256 kubelet[1621]: I0516 00:52:25.475201 1621 server.go:1289] "Started kubelet" May 16 00:52:25.475415 kubelet[1621]: I0516 00:52:25.475384 1621 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 16 00:52:25.477844 kubelet[1621]: I0516 00:52:25.477820 1621 server.go:317] "Adding debug handlers to kubelet server" May 16 00:52:25.489000 audit[1621]: AVC avc: denied { mac_admin } for pid=1621 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:25.489000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:52:25.489000 audit[1621]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000beb1d0 a1=4000751650 a2=4000beb1a0 a3=25 items=0 ppid=1 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.489000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:52:25.490000 audit[1621]: AVC avc: denied { mac_admin } for pid=1621 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:25.490000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:52:25.490000 audit[1621]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400043fb80 a1=4000751668 a2=4000beb260 a3=25 items=0 ppid=1 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.490000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:52:25.492217 kubelet[1621]: I0516 00:52:25.491754 1621 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 16 00:52:25.492217 kubelet[1621]: E0516 00:52:25.491998 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.0.0.134:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 16 00:52:25.492540 kubelet[1621]: I0516 00:52:25.492517 1621 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 16 00:52:25.492636 kubelet[1621]: I0516 00:52:25.492618 1621 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 16 00:52:25.493068 kubelet[1621]: E0516 00:52:25.491921 1621 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.134:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.134:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fdbb3bdee3ac2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-16 00:52:25.475177154 +0000 UTC m=+1.280325231,LastTimestamp:2025-05-16 00:52:25.475177154 +0000 UTC m=+1.280325231,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 16 00:52:25.493198 kubelet[1621]: I0516 00:52:25.493169 1621 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 16 00:52:25.494667 kubelet[1621]: I0516 00:52:25.494645 1621 volume_manager.go:297] "Starting Kubelet Volume Manager" May 16 00:52:25.494924 kubelet[1621]: E0516 00:52:25.494902 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:25.495041 kubelet[1621]: E0516 00:52:25.495012 1621 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 16 00:52:25.495465 kubelet[1621]: E0516 00:52:25.495416 1621 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.134:6443: connect: connection refused" interval="200ms" May 16 00:52:25.495522 kubelet[1621]: I0516 00:52:25.495474 1621 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 16 00:52:25.495664 kubelet[1621]: I0516 00:52:25.495634 1621 reconciler.go:26] "Reconciler: start to sync state" May 16 00:52:25.495813 kubelet[1621]: I0516 00:52:25.495792 1621 factory.go:223] Registration of the systemd container factory successfully May 16 00:52:25.496053 kubelet[1621]: E0516 00:52:25.496027 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.0.0.134:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 16 00:52:25.496053 kubelet[1621]: I0516 00:52:25.496031 1621 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 16 00:52:25.496283 kubelet[1621]: I0516 00:52:25.490837 1621 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 16 00:52:25.496901 kubelet[1621]: I0516 00:52:25.496875 1621 factory.go:223] Registration of the containerd container factory successfully May 16 00:52:25.497046 kubelet[1621]: I0516 00:52:25.497020 1621 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 16 00:52:25.500000 audit[1642]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.500000 audit[1642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdc1f1ab0 a2=0 a3=1 items=0 ppid=1621 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 16 00:52:25.503000 audit[1643]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.503000 audit[1643]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2837410 a2=0 a3=1 items=0 ppid=1621 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 16 00:52:25.505000 audit[1647]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.505000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe625e620 a2=0 a3=1 items=0 ppid=1621 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:52:25.507743 kubelet[1621]: I0516 00:52:25.507706 1621 cpu_manager.go:221] "Starting CPU manager" policy="none" May 16 00:52:25.507824 kubelet[1621]: I0516 00:52:25.507811 1621 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 16 00:52:25.507895 kubelet[1621]: I0516 00:52:25.507884 1621 state_mem.go:36] "Initialized new in-memory state store" May 16 00:52:25.508000 audit[1649]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.508000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffce492d00 a2=0 a3=1 items=0 ppid=1621 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.508000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:52:25.595012 kubelet[1621]: E0516 00:52:25.594964 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:25.623972 kubelet[1621]: I0516 00:52:25.623945 1621 policy_none.go:49] "None policy: Start" May 16 00:52:25.624083 kubelet[1621]: I0516 00:52:25.624072 1621 memory_manager.go:186] "Starting memorymanager" policy="None" May 16 00:52:25.624159 kubelet[1621]: I0516 00:52:25.624148 1621 state_mem.go:35] "Initializing new in-memory state store" May 16 00:52:25.628960 systemd[1]: Created slice kubepods.slice. May 16 00:52:25.633339 systemd[1]: Created slice kubepods-burstable.slice. May 16 00:52:25.632000 audit[1653]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.632000 audit[1653]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff0da97d0 a2=0 a3=1 items=0 ppid=1621 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 16 00:52:25.634778 kubelet[1621]: I0516 00:52:25.634733 1621 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 16 00:52:25.633000 audit[1654]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1654 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:25.633000 audit[1654]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb1a9e30 a2=0 a3=1 items=0 ppid=1621 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 16 00:52:25.633000 audit[1655]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.633000 audit[1655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffea6840d0 a2=0 a3=1 items=0 ppid=1621 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.633000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 16 00:52:25.635957 systemd[1]: Created slice kubepods-besteffort.slice. May 16 00:52:25.634000 audit[1656]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1656 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.634000 audit[1656]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd5e39310 a2=0 a3=1 items=0 ppid=1621 pid=1656 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 16 00:52:25.635000 audit[1657]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:25.635000 audit[1657]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd46cd20 a2=0 a3=1 items=0 ppid=1621 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.635000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 16 00:52:25.637634 kubelet[1621]: I0516 00:52:25.637587 1621 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 16 00:52:25.637634 kubelet[1621]: I0516 00:52:25.637616 1621 status_manager.go:230] "Starting to sync pod status with apiserver" May 16 00:52:25.637696 kubelet[1621]: I0516 00:52:25.637637 1621 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 16 00:52:25.637696 kubelet[1621]: I0516 00:52:25.637648 1621 kubelet.go:2436] "Starting kubelet main sync loop" May 16 00:52:25.637756 kubelet[1621]: E0516 00:52:25.637693 1621 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 16 00:52:25.637000 audit[1658]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:25.637000 audit[1658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff355c1f0 a2=0 a3=1 items=0 ppid=1621 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.637000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 16 00:52:25.639501 kubelet[1621]: E0516 00:52:25.639473 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.0.0.134:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 16 00:52:25.638000 audit[1659]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:25.638000 audit[1659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffd0ed3590 a2=0 a3=1 items=0 ppid=1621 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.638000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 16 00:52:25.639000 audit[1660]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:25.639000 audit[1660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc05f9630 a2=0 a3=1 items=0 ppid=1621 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.639000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 16 00:52:25.645589 kubelet[1621]: E0516 00:52:25.645561 1621 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 16 00:52:25.643000 audit[1621]: AVC avc: denied { mac_admin } for pid=1621 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:25.643000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:52:25.643000 audit[1621]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000da9ad0 a1=4000f72858 a2=4000da9aa0 a3=25 items=0 ppid=1 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:25.643000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:52:25.645831 kubelet[1621]: E0516 00:52:25.645702 1621 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 16 00:52:25.645859 kubelet[1621]: I0516 00:52:25.645852 1621 eviction_manager.go:189] "Eviction manager: starting control loop" May 16 00:52:25.645898 kubelet[1621]: I0516 00:52:25.645865 1621 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 16 00:52:25.646124 kubelet[1621]: I0516 00:52:25.646090 1621 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 16 00:52:25.646909 kubelet[1621]: E0516 00:52:25.646878 1621 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 16 00:52:25.647033 kubelet[1621]: E0516 00:52:25.647017 1621 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 16 00:52:25.696687 kubelet[1621]: E0516 00:52:25.696643 1621 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.134:6443: connect: connection refused" interval="400ms" May 16 00:52:25.747536 kubelet[1621]: I0516 00:52:25.747028 1621 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:52:25.747536 kubelet[1621]: E0516 00:52:25.747488 1621 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.134:6443/api/v1/nodes\": dial tcp 10.0.0.134:6443: connect: connection refused" node="localhost" May 16 00:52:25.747779 systemd[1]: Created slice kubepods-burstable-pod179a9119a8274b40d45709aa314b205c.slice. May 16 00:52:25.756413 kubelet[1621]: E0516 00:52:25.756379 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:25.760106 systemd[1]: Created slice kubepods-burstable-pod97963c41ada533e2e0872a518ecd4611.slice. May 16 00:52:25.770855 kubelet[1621]: E0516 00:52:25.770820 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:25.773013 systemd[1]: Created slice kubepods-burstable-pod8fba52155e63f70cc922ab7cc8c200fd.slice. May 16 00:52:25.774517 kubelet[1621]: E0516 00:52:25.774494 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:25.797255 kubelet[1621]: I0516 00:52:25.797219 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:25.797255 kubelet[1621]: I0516 00:52:25.797257 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:25.797387 kubelet[1621]: I0516 00:52:25.797278 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8fba52155e63f70cc922ab7cc8c200fd-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8fba52155e63f70cc922ab7cc8c200fd\") " pod="kube-system/kube-scheduler-localhost" May 16 00:52:25.797387 kubelet[1621]: I0516 00:52:25.797291 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/179a9119a8274b40d45709aa314b205c-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"179a9119a8274b40d45709aa314b205c\") " pod="kube-system/kube-apiserver-localhost" May 16 00:52:25.797387 kubelet[1621]: I0516 00:52:25.797306 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:25.797387 kubelet[1621]: I0516 00:52:25.797320 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:25.797387 kubelet[1621]: I0516 00:52:25.797335 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:25.797502 kubelet[1621]: I0516 00:52:25.797351 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/179a9119a8274b40d45709aa314b205c-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"179a9119a8274b40d45709aa314b205c\") " pod="kube-system/kube-apiserver-localhost" May 16 00:52:25.797502 kubelet[1621]: I0516 00:52:25.797365 1621 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/179a9119a8274b40d45709aa314b205c-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"179a9119a8274b40d45709aa314b205c\") " pod="kube-system/kube-apiserver-localhost" May 16 00:52:25.949335 kubelet[1621]: I0516 00:52:25.949227 1621 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:52:25.949781 kubelet[1621]: E0516 00:52:25.949743 1621 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.134:6443/api/v1/nodes\": dial tcp 10.0.0.134:6443: connect: connection refused" node="localhost" May 16 00:52:26.056833 kubelet[1621]: E0516 00:52:26.056794 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:26.057473 env[1219]: time="2025-05-16T00:52:26.057418352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:179a9119a8274b40d45709aa314b205c,Namespace:kube-system,Attempt:0,}" May 16 00:52:26.072197 kubelet[1621]: E0516 00:52:26.072157 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:26.072675 env[1219]: time="2025-05-16T00:52:26.072633082Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:97963c41ada533e2e0872a518ecd4611,Namespace:kube-system,Attempt:0,}" May 16 00:52:26.075439 kubelet[1621]: E0516 00:52:26.075411 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:26.075844 env[1219]: time="2025-05-16T00:52:26.075810131Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8fba52155e63f70cc922ab7cc8c200fd,Namespace:kube-system,Attempt:0,}" May 16 00:52:26.097471 kubelet[1621]: E0516 00:52:26.097441 1621 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.134:6443: connect: connection refused" interval="800ms" May 16 00:52:26.351308 kubelet[1621]: I0516 00:52:26.350944 1621 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:52:26.351308 kubelet[1621]: E0516 00:52:26.351248 1621 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.134:6443/api/v1/nodes\": dial tcp 10.0.0.134:6443: connect: connection refused" node="localhost" May 16 00:52:26.571148 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount876417673.mount: Deactivated successfully. May 16 00:52:26.575454 env[1219]: time="2025-05-16T00:52:26.575404932Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.577305 env[1219]: time="2025-05-16T00:52:26.577263403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.578525 env[1219]: time="2025-05-16T00:52:26.578488217Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.580323 env[1219]: time="2025-05-16T00:52:26.580288540Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.582841 env[1219]: time="2025-05-16T00:52:26.582803319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.584848 env[1219]: time="2025-05-16T00:52:26.584816542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.588303 env[1219]: time="2025-05-16T00:52:26.588273002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.591646 env[1219]: time="2025-05-16T00:52:26.591613447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.592467 env[1219]: time="2025-05-16T00:52:26.592436353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.593483 env[1219]: time="2025-05-16T00:52:26.593456231Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.594298 env[1219]: time="2025-05-16T00:52:26.594270332Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.595278 env[1219]: time="2025-05-16T00:52:26.595251392Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:26.623708 env[1219]: time="2025-05-16T00:52:26.623582549Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:26.623708 env[1219]: time="2025-05-16T00:52:26.623619526Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:26.623708 env[1219]: time="2025-05-16T00:52:26.623630931Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:26.624388 env[1219]: time="2025-05-16T00:52:26.624120481Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c36a56b0d321c36c630332316af55b35bceede41bdcd8ab1e14ff838a1ce95c6 pid=1681 runtime=io.containerd.runc.v2 May 16 00:52:26.625206 env[1219]: time="2025-05-16T00:52:26.624765303Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:26.625206 env[1219]: time="2025-05-16T00:52:26.624830614Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:26.625206 env[1219]: time="2025-05-16T00:52:26.624755899Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:26.625206 env[1219]: time="2025-05-16T00:52:26.624786233Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:26.625206 env[1219]: time="2025-05-16T00:52:26.624795877Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:26.625206 env[1219]: time="2025-05-16T00:52:26.624931101Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/391124640a8d6b265a3410e6721524dd0ddc1e47b124df66b89dd91d4c72c2da pid=1683 runtime=io.containerd.runc.v2 May 16 00:52:26.625411 env[1219]: time="2025-05-16T00:52:26.624929140Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:26.626261 env[1219]: time="2025-05-16T00:52:26.625897234Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/565b2e8eac68b29451090c9916df49117823b6bc2eefbbfbfaaa398c0da1f731 pid=1684 runtime=io.containerd.runc.v2 May 16 00:52:26.639433 systemd[1]: Started cri-containerd-391124640a8d6b265a3410e6721524dd0ddc1e47b124df66b89dd91d4c72c2da.scope. May 16 00:52:26.648841 systemd[1]: Started cri-containerd-c36a56b0d321c36c630332316af55b35bceede41bdcd8ab1e14ff838a1ce95c6.scope. May 16 00:52:26.656018 systemd[1]: Started cri-containerd-565b2e8eac68b29451090c9916df49117823b6bc2eefbbfbfaaa398c0da1f731.scope. May 16 00:52:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit: BPF prog-id=55 op=LOAD May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1683 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313132343634306138643662323635613334313065363732313532 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1683 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313132343634306138643662323635613334313065363732313532 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit: BPF prog-id=56 op=LOAD May 16 00:52:26.678000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1683 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313132343634306138643662323635613334313065363732313532 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit: BPF prog-id=57 op=LOAD May 16 00:52:26.678000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1683 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313132343634306138643662323635613334313065363732313532 May 16 00:52:26.678000 audit: BPF prog-id=57 op=UNLOAD May 16 00:52:26.678000 audit: BPF prog-id=56 op=UNLOAD May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.678000 audit: BPF prog-id=58 op=LOAD May 16 00:52:26.678000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1683 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339313132343634306138643662323635613334313065363732313532 May 16 00:52:26.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.679000 audit: BPF prog-id=59 op=LOAD May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=1684 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356232653865616336386232393435313039306339393136646634 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=1684 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356232653865616336386232393435313039306339393136646634 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit: BPF prog-id=60 op=LOAD May 16 00:52:26.680000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=1684 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356232653865616336386232393435313039306339393136646634 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit: BPF prog-id=61 op=LOAD May 16 00:52:26.680000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=1684 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356232653865616336386232393435313039306339393136646634 May 16 00:52:26.680000 audit: BPF prog-id=61 op=UNLOAD May 16 00:52:26.680000 audit: BPF prog-id=60 op=UNLOAD May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.680000 audit: BPF prog-id=62 op=LOAD May 16 00:52:26.680000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=1684 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536356232653865616336386232393435313039306339393136646634 May 16 00:52:26.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit: BPF prog-id=63 op=LOAD May 16 00:52:26.688000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1681 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333366135366230643332316333366336333033333233313661663535 May 16 00:52:26.688000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.688000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1681 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.688000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333366135366230643332316333366336333033333233313661663535 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit: BPF prog-id=64 op=LOAD May 16 00:52:26.689000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1681 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333366135366230643332316333366336333033333233313661663535 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit: BPF prog-id=65 op=LOAD May 16 00:52:26.689000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1681 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333366135366230643332316333366336333033333233313661663535 May 16 00:52:26.689000 audit: BPF prog-id=65 op=UNLOAD May 16 00:52:26.689000 audit: BPF prog-id=64 op=UNLOAD May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { perfmon } for pid=1711 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit[1711]: AVC avc: denied { bpf } for pid=1711 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.689000 audit: BPF prog-id=66 op=LOAD May 16 00:52:26.689000 audit[1711]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1681 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.689000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333366135366230643332316333366336333033333233313661663535 May 16 00:52:26.707826 env[1219]: time="2025-05-16T00:52:26.707773523Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8fba52155e63f70cc922ab7cc8c200fd,Namespace:kube-system,Attempt:0,} returns sandbox id \"391124640a8d6b265a3410e6721524dd0ddc1e47b124df66b89dd91d4c72c2da\"" May 16 00:52:26.708694 kubelet[1621]: E0516 00:52:26.708659 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:26.714000 env[1219]: time="2025-05-16T00:52:26.713962143Z" level=info msg="CreateContainer within sandbox \"391124640a8d6b265a3410e6721524dd0ddc1e47b124df66b89dd91d4c72c2da\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 16 00:52:26.714669 env[1219]: time="2025-05-16T00:52:26.714641541Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:179a9119a8274b40d45709aa314b205c,Namespace:kube-system,Attempt:0,} returns sandbox id \"565b2e8eac68b29451090c9916df49117823b6bc2eefbbfbfaaa398c0da1f731\"" May 16 00:52:26.715316 kubelet[1621]: E0516 00:52:26.715295 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:26.715867 env[1219]: time="2025-05-16T00:52:26.715829858Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:97963c41ada533e2e0872a518ecd4611,Namespace:kube-system,Attempt:0,} returns sandbox id \"c36a56b0d321c36c630332316af55b35bceede41bdcd8ab1e14ff838a1ce95c6\"" May 16 00:52:26.717052 kubelet[1621]: E0516 00:52:26.717026 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:26.718152 env[1219]: time="2025-05-16T00:52:26.718116610Z" level=info msg="CreateContainer within sandbox \"565b2e8eac68b29451090c9916df49117823b6bc2eefbbfbfaaa398c0da1f731\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 16 00:52:26.720477 env[1219]: time="2025-05-16T00:52:26.720444340Z" level=info msg="CreateContainer within sandbox \"c36a56b0d321c36c630332316af55b35bceede41bdcd8ab1e14ff838a1ce95c6\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 16 00:52:26.732704 env[1219]: time="2025-05-16T00:52:26.732651261Z" level=info msg="CreateContainer within sandbox \"391124640a8d6b265a3410e6721524dd0ddc1e47b124df66b89dd91d4c72c2da\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"f629c51305f31e058f5e5c696dfb1c17445f2669528b93b388eaf918a2c03bfe\"" May 16 00:52:26.733410 env[1219]: time="2025-05-16T00:52:26.733375520Z" level=info msg="StartContainer for \"f629c51305f31e058f5e5c696dfb1c17445f2669528b93b388eaf918a2c03bfe\"" May 16 00:52:26.736334 env[1219]: time="2025-05-16T00:52:26.736295048Z" level=info msg="CreateContainer within sandbox \"565b2e8eac68b29451090c9916df49117823b6bc2eefbbfbfaaa398c0da1f731\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"17cb23ad60de59664fed760bd54628d394ef5507a73770622c2dab2f5d396bbb\"" May 16 00:52:26.736811 env[1219]: time="2025-05-16T00:52:26.736781876Z" level=info msg="StartContainer for \"17cb23ad60de59664fed760bd54628d394ef5507a73770622c2dab2f5d396bbb\"" May 16 00:52:26.737952 env[1219]: time="2025-05-16T00:52:26.737913487Z" level=info msg="CreateContainer within sandbox \"c36a56b0d321c36c630332316af55b35bceede41bdcd8ab1e14ff838a1ce95c6\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e91b2388c0fabdb1e89ec4f52ee8e6232718d721da97e2afd795a7b439fdd385\"" May 16 00:52:26.738373 env[1219]: time="2025-05-16T00:52:26.738346490Z" level=info msg="StartContainer for \"e91b2388c0fabdb1e89ec4f52ee8e6232718d721da97e2afd795a7b439fdd385\"" May 16 00:52:26.753209 systemd[1]: Started cri-containerd-f629c51305f31e058f5e5c696dfb1c17445f2669528b93b388eaf918a2c03bfe.scope. May 16 00:52:26.757461 systemd[1]: Started cri-containerd-17cb23ad60de59664fed760bd54628d394ef5507a73770622c2dab2f5d396bbb.scope. May 16 00:52:26.763596 systemd[1]: Started cri-containerd-e91b2388c0fabdb1e89ec4f52ee8e6232718d721da97e2afd795a7b439fdd385.scope. May 16 00:52:26.789887 kernel: kauditd_printk_skb: 390 callbacks suppressed May 16 00:52:26.789987 kernel: audit: type=1400 audit(1747356746.781:501): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.790009 kernel: audit: type=1400 audit(1747356746.781:502): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.790024 kernel: audit: type=1400 audit(1747356746.781:503): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.790038 kernel: audit: type=1400 audit(1747356746.781:504): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.790057 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 16 00:52:26.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.792208 kernel: audit: type=1400 audit(1747356746.781:505): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.792246 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 16 00:52:26.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.793851 kernel: audit: type=1400 audit(1747356746.781:506): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.793943 kernel: audit: backlog limit exceeded May 16 00:52:26.794554 kernel: audit: type=1400 audit(1747356746.781:507): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit: BPF prog-id=67 op=LOAD May 16 00:52:26.782000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1684 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636232336164363064653539363634666564373630626435343632 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1684 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636232336164363064653539363634666564373630626435343632 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.782000 audit: BPF prog-id=68 op=LOAD May 16 00:52:26.782000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1684 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636232336164363064653539363634666564373630626435343632 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.784000 audit: BPF prog-id=69 op=LOAD May 16 00:52:26.784000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1684 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636232336164363064653539363634666564373630626435343632 May 16 00:52:26.785000 audit: BPF prog-id=69 op=UNLOAD May 16 00:52:26.785000 audit: BPF prog-id=68 op=UNLOAD May 16 00:52:26.785000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { perfmon } for pid=1813 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit[1813]: AVC avc: denied { bpf } for pid=1813 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.785000 audit: BPF prog-id=70 op=LOAD May 16 00:52:26.785000 audit[1813]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1684 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.785000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137636232336164363064653539363634666564373630626435343632 May 16 00:52:26.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit: BPF prog-id=71 op=LOAD May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=1681 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316232333838633066616264623165383965633466353265653865 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1681 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316232333838633066616264623165383965633466353265653865 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit: BPF prog-id=72 op=LOAD May 16 00:52:26.796000 audit[1812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1681 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316232333838633066616264623165383965633466353265653865 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit: BPF prog-id=73 op=LOAD May 16 00:52:26.796000 audit[1812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1681 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316232333838633066616264623165383965633466353265653865 May 16 00:52:26.796000 audit: BPF prog-id=73 op=UNLOAD May 16 00:52:26.796000 audit: BPF prog-id=72 op=UNLOAD May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { perfmon } for pid=1812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit[1812]: AVC avc: denied { bpf } for pid=1812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.796000 audit: BPF prog-id=74 op=LOAD May 16 00:52:26.796000 audit[1812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1681 pid=1812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539316232333838633066616264623165383965633466353265653865 May 16 00:52:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.801000 audit: BPF prog-id=75 op=LOAD May 16 00:52:26.802000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1683 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323963353133303566333165303538663565356336393664666231 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1683 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323963353133303566333165303538663565356336393664666231 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.802000 audit: BPF prog-id=76 op=LOAD May 16 00:52:26.802000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1683 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323963353133303566333165303538663565356336393664666231 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.803000 audit: BPF prog-id=77 op=LOAD May 16 00:52:26.803000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1683 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323963353133303566333165303538663565356336393664666231 May 16 00:52:26.804000 audit: BPF prog-id=77 op=UNLOAD May 16 00:52:26.804000 audit: BPF prog-id=76 op=UNLOAD May 16 00:52:26.804000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { perfmon } for pid=1799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit[1799]: AVC avc: denied { bpf } for pid=1799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:26.804000 audit: BPF prog-id=78 op=LOAD May 16 00:52:26.804000 audit[1799]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1683 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:26.804000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636323963353133303566333165303538663565356336393664666231 May 16 00:52:26.815991 env[1219]: time="2025-05-16T00:52:26.815945374Z" level=info msg="StartContainer for \"17cb23ad60de59664fed760bd54628d394ef5507a73770622c2dab2f5d396bbb\" returns successfully" May 16 00:52:26.864305 env[1219]: time="2025-05-16T00:52:26.864170013Z" level=info msg="StartContainer for \"e91b2388c0fabdb1e89ec4f52ee8e6232718d721da97e2afd795a7b439fdd385\" returns successfully" May 16 00:52:26.881596 env[1219]: time="2025-05-16T00:52:26.881487409Z" level=info msg="StartContainer for \"f629c51305f31e058f5e5c696dfb1c17445f2669528b93b388eaf918a2c03bfe\" returns successfully" May 16 00:52:26.903532 kubelet[1621]: E0516 00:52:26.903493 1621 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.134:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.134:6443: connect: connection refused" interval="1.6s" May 16 00:52:26.911227 kubelet[1621]: E0516 00:52:26.911195 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.0.0.134:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 16 00:52:26.966255 kubelet[1621]: E0516 00:52:26.966213 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.0.0.134:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 16 00:52:27.001631 kubelet[1621]: E0516 00:52:27.001589 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.0.0.134:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 16 00:52:27.016523 kubelet[1621]: E0516 00:52:27.016482 1621 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.0.0.134:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.134:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 16 00:52:27.152640 kubelet[1621]: I0516 00:52:27.152546 1621 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:52:27.645362 kubelet[1621]: E0516 00:52:27.645330 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:27.645488 kubelet[1621]: E0516 00:52:27.645456 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:27.647385 kubelet[1621]: E0516 00:52:27.647361 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:27.647591 kubelet[1621]: E0516 00:52:27.647574 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:27.649034 kubelet[1621]: E0516 00:52:27.649014 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:27.649125 kubelet[1621]: E0516 00:52:27.649112 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:28.088000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.088000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40025a9b60 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:52:28.088000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:28.089000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.089000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400814a540 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:52:28.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:28.089000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.089000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004f9e030 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:52:28.089000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:28.090000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.090000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=4005eb0080 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:52:28.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:28.090000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.090000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=40053ec990 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:52:28.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:28.106000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.106000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=85 a1=400814a6c0 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:52:28.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:52:28.263155 kubelet[1621]: I0516 00:52:28.263116 1621 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 16 00:52:28.263155 kubelet[1621]: E0516 00:52:28.263155 1621 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 16 00:52:28.280827 kubelet[1621]: E0516 00:52:28.280792 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:28.381019 kubelet[1621]: E0516 00:52:28.380913 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:28.481899 kubelet[1621]: E0516 00:52:28.481857 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:28.582343 kubelet[1621]: E0516 00:52:28.582304 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:28.637000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.637000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400011c450 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:28.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:28.637000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:28.637000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=400038e180 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:28.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:28.651846 kubelet[1621]: E0516 00:52:28.651822 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:28.651949 kubelet[1621]: E0516 00:52:28.651893 1621 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 16 00:52:28.651949 kubelet[1621]: E0516 00:52:28.651939 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:28.652074 kubelet[1621]: E0516 00:52:28.651987 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:28.683071 kubelet[1621]: E0516 00:52:28.683035 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:28.784028 kubelet[1621]: E0516 00:52:28.783996 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:28.884569 kubelet[1621]: E0516 00:52:28.884531 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:28.985527 kubelet[1621]: E0516 00:52:28.985495 1621 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:29.096232 kubelet[1621]: I0516 00:52:29.096187 1621 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 16 00:52:29.101044 kubelet[1621]: E0516 00:52:29.101020 1621 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 16 00:52:29.101044 kubelet[1621]: I0516 00:52:29.101047 1621 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 16 00:52:29.102398 kubelet[1621]: E0516 00:52:29.102377 1621 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 16 00:52:29.102431 kubelet[1621]: I0516 00:52:29.102400 1621 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 16 00:52:29.103873 kubelet[1621]: E0516 00:52:29.103855 1621 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 16 00:52:29.472909 kubelet[1621]: I0516 00:52:29.472877 1621 apiserver.go:52] "Watching apiserver" May 16 00:52:29.495979 kubelet[1621]: I0516 00:52:29.495948 1621 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 16 00:52:29.652266 kubelet[1621]: I0516 00:52:29.652239 1621 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 16 00:52:29.658188 kubelet[1621]: E0516 00:52:29.658154 1621 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:30.161978 systemd[1]: Reloading. May 16 00:52:30.209730 /usr/lib/systemd/system-generators/torcx-generator[1928]: time="2025-05-16T00:52:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 16 00:52:30.209765 /usr/lib/systemd/system-generators/torcx-generator[1928]: time="2025-05-16T00:52:30Z" level=info msg="torcx already run" May 16 00:52:30.262930 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 16 00:52:30.262948 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 16 00:52:30.278045 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 16 00:52:30.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.334000 audit: BPF prog-id=79 op=LOAD May 16 00:52:30.334000 audit: BPF prog-id=40 op=UNLOAD May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit: BPF prog-id=80 op=LOAD May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.335000 audit: BPF prog-id=81 op=LOAD May 16 00:52:30.335000 audit: BPF prog-id=41 op=UNLOAD May 16 00:52:30.335000 audit: BPF prog-id=42 op=UNLOAD May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit: BPF prog-id=82 op=LOAD May 16 00:52:30.336000 audit: BPF prog-id=55 op=UNLOAD May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit: BPF prog-id=83 op=LOAD May 16 00:52:30.336000 audit: BPF prog-id=59 op=UNLOAD May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit: BPF prog-id=84 op=LOAD May 16 00:52:30.337000 audit: BPF prog-id=43 op=UNLOAD May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit: BPF prog-id=85 op=LOAD May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.337000 audit: BPF prog-id=86 op=LOAD May 16 00:52:30.337000 audit: BPF prog-id=44 op=UNLOAD May 16 00:52:30.337000 audit: BPF prog-id=45 op=UNLOAD May 16 00:52:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.338000 audit: BPF prog-id=87 op=LOAD May 16 00:52:30.338000 audit: BPF prog-id=46 op=UNLOAD May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit: BPF prog-id=88 op=LOAD May 16 00:52:30.339000 audit: BPF prog-id=47 op=UNLOAD May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit: BPF prog-id=89 op=LOAD May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.339000 audit: BPF prog-id=90 op=LOAD May 16 00:52:30.339000 audit: BPF prog-id=48 op=UNLOAD May 16 00:52:30.339000 audit: BPF prog-id=49 op=UNLOAD May 16 00:52:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.340000 audit: BPF prog-id=91 op=LOAD May 16 00:52:30.340000 audit: BPF prog-id=63 op=UNLOAD May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit: BPF prog-id=92 op=LOAD May 16 00:52:30.341000 audit: BPF prog-id=50 op=UNLOAD May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit: BPF prog-id=93 op=LOAD May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.341000 audit: BPF prog-id=94 op=LOAD May 16 00:52:30.341000 audit: BPF prog-id=51 op=UNLOAD May 16 00:52:30.341000 audit: BPF prog-id=52 op=UNLOAD May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit: BPF prog-id=95 op=LOAD May 16 00:52:30.342000 audit: BPF prog-id=71 op=UNLOAD May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.342000 audit: BPF prog-id=96 op=LOAD May 16 00:52:30.342000 audit: BPF prog-id=53 op=UNLOAD May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit: BPF prog-id=97 op=LOAD May 16 00:52:30.343000 audit: BPF prog-id=67 op=UNLOAD May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.343000 audit: BPF prog-id=98 op=LOAD May 16 00:52:30.343000 audit: BPF prog-id=75 op=UNLOAD May 16 00:52:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.345000 audit: BPF prog-id=99 op=LOAD May 16 00:52:30.345000 audit: BPF prog-id=54 op=UNLOAD May 16 00:52:30.358563 systemd[1]: Stopping kubelet.service... May 16 00:52:30.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:30.388092 systemd[1]: kubelet.service: Deactivated successfully. May 16 00:52:30.388277 systemd[1]: Stopped kubelet.service. May 16 00:52:30.388323 systemd[1]: kubelet.service: Consumed 1.651s CPU time. May 16 00:52:30.389823 systemd[1]: Starting kubelet.service... May 16 00:52:30.485926 systemd[1]: Started kubelet.service. May 16 00:52:30.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:30.521598 kubelet[1970]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:52:30.521598 kubelet[1970]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 16 00:52:30.521598 kubelet[1970]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 16 00:52:30.521938 kubelet[1970]: I0516 00:52:30.521650 1970 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 16 00:52:30.526872 kubelet[1970]: I0516 00:52:30.526844 1970 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 16 00:52:30.526965 kubelet[1970]: I0516 00:52:30.526954 1970 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 16 00:52:30.527224 kubelet[1970]: I0516 00:52:30.527205 1970 server.go:956] "Client rotation is on, will bootstrap in background" May 16 00:52:30.528453 kubelet[1970]: I0516 00:52:30.528428 1970 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" May 16 00:52:30.531020 kubelet[1970]: I0516 00:52:30.530982 1970 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 16 00:52:30.534752 kubelet[1970]: E0516 00:52:30.534724 1970 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 16 00:52:30.534871 kubelet[1970]: I0516 00:52:30.534857 1970 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 16 00:52:30.537266 kubelet[1970]: I0516 00:52:30.537244 1970 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 16 00:52:30.537476 kubelet[1970]: I0516 00:52:30.537441 1970 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 16 00:52:30.537601 kubelet[1970]: I0516 00:52:30.537462 1970 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 16 00:52:30.537678 kubelet[1970]: I0516 00:52:30.537611 1970 topology_manager.go:138] "Creating topology manager with none policy" May 16 00:52:30.537678 kubelet[1970]: I0516 00:52:30.537620 1970 container_manager_linux.go:303] "Creating device plugin manager" May 16 00:52:30.537678 kubelet[1970]: I0516 00:52:30.537665 1970 state_mem.go:36] "Initialized new in-memory state store" May 16 00:52:30.537817 kubelet[1970]: I0516 00:52:30.537806 1970 kubelet.go:480] "Attempting to sync node with API server" May 16 00:52:30.537845 kubelet[1970]: I0516 00:52:30.537821 1970 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 16 00:52:30.537845 kubelet[1970]: I0516 00:52:30.537842 1970 kubelet.go:386] "Adding apiserver pod source" May 16 00:52:30.537890 kubelet[1970]: I0516 00:52:30.537853 1970 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 16 00:52:30.538611 kubelet[1970]: I0516 00:52:30.538579 1970 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 16 00:52:30.540252 kubelet[1970]: I0516 00:52:30.540220 1970 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 16 00:52:30.542213 kubelet[1970]: I0516 00:52:30.542196 1970 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 16 00:52:30.542378 kubelet[1970]: I0516 00:52:30.542233 1970 server.go:1289] "Started kubelet" May 16 00:52:30.542486 kubelet[1970]: I0516 00:52:30.542459 1970 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 16 00:52:30.543166 kubelet[1970]: I0516 00:52:30.543114 1970 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 16 00:52:30.543413 kubelet[1970]: I0516 00:52:30.543391 1970 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 16 00:52:30.543935 kubelet[1970]: I0516 00:52:30.543916 1970 server.go:317] "Adding debug handlers to kubelet server" May 16 00:52:30.543000 audit[1970]: AVC avc: denied { mac_admin } for pid=1970 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.543000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:52:30.543000 audit[1970]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d2c180 a1=4000be0690 a2=4000d2c150 a3=25 items=0 ppid=1 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:30.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:52:30.543000 audit[1970]: AVC avc: denied { mac_admin } for pid=1970 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.543000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:52:30.543000 audit[1970]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40000d51e0 a1=4000be06a8 a2=4000d2c210 a3=25 items=0 ppid=1 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:30.543000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:52:30.545499 kubelet[1970]: I0516 00:52:30.545174 1970 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 16 00:52:30.545499 kubelet[1970]: I0516 00:52:30.545217 1970 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 16 00:52:30.545499 kubelet[1970]: I0516 00:52:30.545244 1970 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 16 00:52:30.545864 kubelet[1970]: I0516 00:52:30.545845 1970 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 16 00:52:30.547372 kubelet[1970]: E0516 00:52:30.547348 1970 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 16 00:52:30.547496 kubelet[1970]: I0516 00:52:30.547481 1970 volume_manager.go:297] "Starting Kubelet Volume Manager" May 16 00:52:30.547735 kubelet[1970]: I0516 00:52:30.547701 1970 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 16 00:52:30.547928 kubelet[1970]: I0516 00:52:30.547911 1970 reconciler.go:26] "Reconciler: start to sync state" May 16 00:52:30.551348 kubelet[1970]: I0516 00:52:30.551312 1970 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 16 00:52:30.552629 kubelet[1970]: I0516 00:52:30.552604 1970 factory.go:223] Registration of the containerd container factory successfully May 16 00:52:30.552629 kubelet[1970]: I0516 00:52:30.552626 1970 factory.go:223] Registration of the systemd container factory successfully May 16 00:52:30.587875 kubelet[1970]: I0516 00:52:30.587840 1970 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 16 00:52:30.589951 kubelet[1970]: I0516 00:52:30.589929 1970 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 16 00:52:30.590105 kubelet[1970]: I0516 00:52:30.590089 1970 status_manager.go:230] "Starting to sync pod status with apiserver" May 16 00:52:30.590179 kubelet[1970]: I0516 00:52:30.590164 1970 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 16 00:52:30.590230 kubelet[1970]: I0516 00:52:30.590220 1970 kubelet.go:2436] "Starting kubelet main sync loop" May 16 00:52:30.590341 kubelet[1970]: E0516 00:52:30.590324 1970 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 16 00:52:30.600137 kubelet[1970]: I0516 00:52:30.600098 1970 cpu_manager.go:221] "Starting CPU manager" policy="none" May 16 00:52:30.600258 kubelet[1970]: I0516 00:52:30.600235 1970 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 16 00:52:30.600328 kubelet[1970]: I0516 00:52:30.600318 1970 state_mem.go:36] "Initialized new in-memory state store" May 16 00:52:30.600496 kubelet[1970]: I0516 00:52:30.600481 1970 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 16 00:52:30.600570 kubelet[1970]: I0516 00:52:30.600548 1970 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 16 00:52:30.600636 kubelet[1970]: I0516 00:52:30.600625 1970 policy_none.go:49] "None policy: Start" May 16 00:52:30.600702 kubelet[1970]: I0516 00:52:30.600691 1970 memory_manager.go:186] "Starting memorymanager" policy="None" May 16 00:52:30.600783 kubelet[1970]: I0516 00:52:30.600772 1970 state_mem.go:35] "Initializing new in-memory state store" May 16 00:52:30.600970 kubelet[1970]: I0516 00:52:30.600954 1970 state_mem.go:75] "Updated machine memory state" May 16 00:52:30.604336 kubelet[1970]: E0516 00:52:30.604314 1970 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 16 00:52:30.602000 audit[1970]: AVC avc: denied { mac_admin } for pid=1970 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:30.602000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 16 00:52:30.602000 audit[1970]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c7fda0 a1=4000a8bcf8 a2=4000c7fd70 a3=25 items=0 ppid=1 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:30.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 16 00:52:30.604600 kubelet[1970]: E0516 00:52:30.604368 1970 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 16 00:52:30.604600 kubelet[1970]: I0516 00:52:30.604492 1970 eviction_manager.go:189] "Eviction manager: starting control loop" May 16 00:52:30.604600 kubelet[1970]: I0516 00:52:30.604504 1970 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 16 00:52:30.604685 kubelet[1970]: I0516 00:52:30.604675 1970 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 16 00:52:30.605439 kubelet[1970]: E0516 00:52:30.605337 1970 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 16 00:52:30.691624 kubelet[1970]: I0516 00:52:30.691588 1970 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 16 00:52:30.691928 kubelet[1970]: I0516 00:52:30.691910 1970 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 16 00:52:30.692081 kubelet[1970]: I0516 00:52:30.692054 1970 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 16 00:52:30.697129 kubelet[1970]: E0516 00:52:30.697095 1970 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 16 00:52:30.708113 kubelet[1970]: I0516 00:52:30.708094 1970 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 16 00:52:30.713420 kubelet[1970]: I0516 00:52:30.713397 1970 kubelet_node_status.go:124] "Node was previously registered" node="localhost" May 16 00:52:30.713756 kubelet[1970]: I0516 00:52:30.713741 1970 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 16 00:52:30.749963 kubelet[1970]: I0516 00:52:30.749876 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:30.750781 kubelet[1970]: I0516 00:52:30.749948 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8fba52155e63f70cc922ab7cc8c200fd-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8fba52155e63f70cc922ab7cc8c200fd\") " pod="kube-system/kube-scheduler-localhost" May 16 00:52:30.750858 kubelet[1970]: I0516 00:52:30.750814 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/179a9119a8274b40d45709aa314b205c-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"179a9119a8274b40d45709aa314b205c\") " pod="kube-system/kube-apiserver-localhost" May 16 00:52:30.750858 kubelet[1970]: I0516 00:52:30.750840 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/179a9119a8274b40d45709aa314b205c-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"179a9119a8274b40d45709aa314b205c\") " pod="kube-system/kube-apiserver-localhost" May 16 00:52:30.750858 kubelet[1970]: I0516 00:52:30.750858 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:30.751001 kubelet[1970]: I0516 00:52:30.750874 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:30.751001 kubelet[1970]: I0516 00:52:30.750891 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/179a9119a8274b40d45709aa314b205c-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"179a9119a8274b40d45709aa314b205c\") " pod="kube-system/kube-apiserver-localhost" May 16 00:52:30.751001 kubelet[1970]: I0516 00:52:30.750906 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:30.751001 kubelet[1970]: I0516 00:52:30.750921 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 16 00:52:30.997100 kubelet[1970]: E0516 00:52:30.997056 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:30.997364 kubelet[1970]: E0516 00:52:30.997342 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:30.997458 kubelet[1970]: E0516 00:52:30.997406 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:31.538043 kubelet[1970]: I0516 00:52:31.538012 1970 apiserver.go:52] "Watching apiserver" May 16 00:52:31.548452 kubelet[1970]: I0516 00:52:31.548430 1970 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 16 00:52:31.596991 kubelet[1970]: I0516 00:52:31.596967 1970 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 16 00:52:31.597475 kubelet[1970]: I0516 00:52:31.597455 1970 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 16 00:52:31.597968 kubelet[1970]: E0516 00:52:31.597943 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:31.607671 kubelet[1970]: E0516 00:52:31.606963 1970 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 16 00:52:31.607671 kubelet[1970]: E0516 00:52:31.607114 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:31.607671 kubelet[1970]: E0516 00:52:31.607359 1970 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 16 00:52:31.607671 kubelet[1970]: E0516 00:52:31.607454 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:31.620452 kubelet[1970]: I0516 00:52:31.620394 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.6203824359999999 podStartE2EDuration="1.620382436s" podCreationTimestamp="2025-05-16 00:52:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:52:31.620329664 +0000 UTC m=+1.126966836" watchObservedRunningTime="2025-05-16 00:52:31.620382436 +0000 UTC m=+1.127019568" May 16 00:52:31.640080 kubelet[1970]: I0516 00:52:31.640024 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.640008395 podStartE2EDuration="1.640008395s" podCreationTimestamp="2025-05-16 00:52:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:52:31.628401884 +0000 UTC m=+1.135039016" watchObservedRunningTime="2025-05-16 00:52:31.640008395 +0000 UTC m=+1.146645527" May 16 00:52:31.645000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:31.645000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ce3bc0 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:31.645000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:31.646000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:31.646000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c24c40 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:31.646000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:31.646000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ce3d60 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:31.647000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:52:31.647000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000ad1460 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:31.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:32.598202 kubelet[1970]: E0516 00:52:32.598169 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:32.598652 kubelet[1970]: E0516 00:52:32.598635 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:33.290104 kubelet[1970]: E0516 00:52:33.290073 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:33.834000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 16 00:52:33.835890 kernel: kauditd_printk_skb: 457 callbacks suppressed May 16 00:52:33.835946 kernel: audit: type=1400 audit(1747356753.834:815): avc: denied { watch } for pid=1853 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520997 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 16 00:52:33.834000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000673fc0 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:33.841418 kernel: audit: type=1300 audit(1747356753.834:815): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000673fc0 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:52:33.841477 kernel: audit: type=1327 audit(1747356753.834:815): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:33.834000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:52:36.328339 kubelet[1970]: I0516 00:52:36.328306 1970 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 16 00:52:36.328968 env[1219]: time="2025-05-16T00:52:36.328880735Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 16 00:52:36.329198 kubelet[1970]: I0516 00:52:36.329059 1970 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 16 00:52:37.099647 kubelet[1970]: I0516 00:52:37.099590 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=8.099571175 podStartE2EDuration="8.099571175s" podCreationTimestamp="2025-05-16 00:52:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:52:31.64053176 +0000 UTC m=+1.147168892" watchObservedRunningTime="2025-05-16 00:52:37.099571175 +0000 UTC m=+6.606208307" May 16 00:52:37.105709 systemd[1]: Created slice kubepods-besteffort-pod4be32cb1_eb87_4c6c_8d4e_f5615673d666.slice. May 16 00:52:37.195430 kubelet[1970]: I0516 00:52:37.195374 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/4be32cb1-eb87-4c6c-8d4e-f5615673d666-kube-proxy\") pod \"kube-proxy-sk9r6\" (UID: \"4be32cb1-eb87-4c6c-8d4e-f5615673d666\") " pod="kube-system/kube-proxy-sk9r6" May 16 00:52:37.195430 kubelet[1970]: I0516 00:52:37.195426 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4be32cb1-eb87-4c6c-8d4e-f5615673d666-xtables-lock\") pod \"kube-proxy-sk9r6\" (UID: \"4be32cb1-eb87-4c6c-8d4e-f5615673d666\") " pod="kube-system/kube-proxy-sk9r6" May 16 00:52:37.195583 kubelet[1970]: I0516 00:52:37.195443 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4be32cb1-eb87-4c6c-8d4e-f5615673d666-lib-modules\") pod \"kube-proxy-sk9r6\" (UID: \"4be32cb1-eb87-4c6c-8d4e-f5615673d666\") " pod="kube-system/kube-proxy-sk9r6" May 16 00:52:37.195583 kubelet[1970]: I0516 00:52:37.195461 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fdg8g\" (UniqueName: \"kubernetes.io/projected/4be32cb1-eb87-4c6c-8d4e-f5615673d666-kube-api-access-fdg8g\") pod \"kube-proxy-sk9r6\" (UID: \"4be32cb1-eb87-4c6c-8d4e-f5615673d666\") " pod="kube-system/kube-proxy-sk9r6" May 16 00:52:37.224742 systemd[1]: Created slice kubepods-besteffort-pod1c63207a_b9cd_47bc_85d3_17bf0824e8db.slice. May 16 00:52:37.296112 kubelet[1970]: I0516 00:52:37.296064 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1c63207a-b9cd-47bc-85d3-17bf0824e8db-var-lib-calico\") pod \"tigera-operator-844669ff44-sfxmt\" (UID: \"1c63207a-b9cd-47bc-85d3-17bf0824e8db\") " pod="tigera-operator/tigera-operator-844669ff44-sfxmt" May 16 00:52:37.296243 kubelet[1970]: I0516 00:52:37.296122 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pkhcc\" (UniqueName: \"kubernetes.io/projected/1c63207a-b9cd-47bc-85d3-17bf0824e8db-kube-api-access-pkhcc\") pod \"tigera-operator-844669ff44-sfxmt\" (UID: \"1c63207a-b9cd-47bc-85d3-17bf0824e8db\") " pod="tigera-operator/tigera-operator-844669ff44-sfxmt" May 16 00:52:37.304025 kubelet[1970]: I0516 00:52:37.304001 1970 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 16 00:52:37.418102 kubelet[1970]: E0516 00:52:37.418006 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:37.418966 env[1219]: time="2025-05-16T00:52:37.418628705Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sk9r6,Uid:4be32cb1-eb87-4c6c-8d4e-f5615673d666,Namespace:kube-system,Attempt:0,}" May 16 00:52:37.437281 env[1219]: time="2025-05-16T00:52:37.437205675Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:37.437398 env[1219]: time="2025-05-16T00:52:37.437256722Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:37.437398 env[1219]: time="2025-05-16T00:52:37.437267563Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:37.437646 env[1219]: time="2025-05-16T00:52:37.437587766Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96b929581359461c2d441ea0bcd079754bdc75da2064f1f34bab1c94ded052c9 pid=2031 runtime=io.containerd.runc.v2 May 16 00:52:37.449808 systemd[1]: Started cri-containerd-96b929581359461c2d441ea0bcd079754bdc75da2064f1f34bab1c94ded052c9.scope. May 16 00:52:37.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471073 kernel: audit: type=1400 audit(1747356757.466:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471111 kernel: audit: type=1400 audit(1747356757.466:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471149 kernel: audit: type=1400 audit(1747356757.466:818): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472800 kernel: audit: type=1400 audit(1747356757.466:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474585 kernel: audit: type=1400 audit(1747356757.466:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.478161 kernel: audit: type=1400 audit(1747356757.466:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.478214 kernel: audit: type=1400 audit(1747356757.466:822): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.468000 audit: BPF prog-id=100 op=LOAD May 16 00:52:37.471000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2031 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623932393538313335393436316332643434316561306263643037 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2031 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623932393538313335393436316332643434316561306263643037 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.471000 audit: BPF prog-id=101 op=LOAD May 16 00:52:37.471000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2031 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623932393538313335393436316332643434316561306263643037 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.472000 audit: BPF prog-id=102 op=LOAD May 16 00:52:37.472000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2031 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623932393538313335393436316332643434316561306263643037 May 16 00:52:37.474000 audit: BPF prog-id=102 op=UNLOAD May 16 00:52:37.474000 audit: BPF prog-id=101 op=UNLOAD May 16 00:52:37.474000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { perfmon } for pid=2041 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit[2041]: AVC avc: denied { bpf } for pid=2041 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.474000 audit: BPF prog-id=103 op=LOAD May 16 00:52:37.474000 audit[2041]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2031 pid=2041 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623932393538313335393436316332643434316561306263643037 May 16 00:52:37.489623 env[1219]: time="2025-05-16T00:52:37.489583136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sk9r6,Uid:4be32cb1-eb87-4c6c-8d4e-f5615673d666,Namespace:kube-system,Attempt:0,} returns sandbox id \"96b929581359461c2d441ea0bcd079754bdc75da2064f1f34bab1c94ded052c9\"" May 16 00:52:37.490323 kubelet[1970]: E0516 00:52:37.490300 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:37.495544 env[1219]: time="2025-05-16T00:52:37.494762871Z" level=info msg="CreateContainer within sandbox \"96b929581359461c2d441ea0bcd079754bdc75da2064f1f34bab1c94ded052c9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 16 00:52:37.506217 env[1219]: time="2025-05-16T00:52:37.506179041Z" level=info msg="CreateContainer within sandbox \"96b929581359461c2d441ea0bcd079754bdc75da2064f1f34bab1c94ded052c9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d47f62b3a6d00e821126ba797ecebc46f6d57ae4b92d1a2f9b5b457f8065baf0\"" May 16 00:52:37.507676 env[1219]: time="2025-05-16T00:52:37.506614579Z" level=info msg="StartContainer for \"d47f62b3a6d00e821126ba797ecebc46f6d57ae4b92d1a2f9b5b457f8065baf0\"" May 16 00:52:37.525171 systemd[1]: Started cri-containerd-d47f62b3a6d00e821126ba797ecebc46f6d57ae4b92d1a2f9b5b457f8065baf0.scope. May 16 00:52:37.529951 env[1219]: time="2025-05-16T00:52:37.529909182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-sfxmt,Uid:1c63207a-b9cd-47bc-85d3-17bf0824e8db,Namespace:tigera-operator,Attempt:0,}" May 16 00:52:37.542774 env[1219]: time="2025-05-16T00:52:37.542701617Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:37.542774 env[1219]: time="2025-05-16T00:52:37.542758064Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:37.542774 env[1219]: time="2025-05-16T00:52:37.542768306Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:37.542963 env[1219]: time="2025-05-16T00:52:37.542930287Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96ef9e20c22dab823db5bb3e52323f5070120dd4d461bc68101f5e07cb7e6266 pid=2096 runtime=io.containerd.runc.v2 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2031 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434376636326233613664303065383231313236626137393765636562 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.549000 audit: BPF prog-id=104 op=LOAD May 16 00:52:37.549000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2031 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434376636326233613664303065383231313236626137393765636562 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.550000 audit: BPF prog-id=105 op=LOAD May 16 00:52:37.550000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2031 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434376636326233613664303065383231313236626137393765636562 May 16 00:52:37.550000 audit: BPF prog-id=105 op=UNLOAD May 16 00:52:37.551000 audit: BPF prog-id=104 op=UNLOAD May 16 00:52:37.551000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.551000 audit: BPF prog-id=106 op=LOAD May 16 00:52:37.551000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2031 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6434376636326233613664303065383231313236626137393765636562 May 16 00:52:37.556663 systemd[1]: Started cri-containerd-96ef9e20c22dab823db5bb3e52323f5070120dd4d461bc68101f5e07cb7e6266.scope. May 16 00:52:37.572756 env[1219]: time="2025-05-16T00:52:37.571951818Z" level=info msg="StartContainer for \"d47f62b3a6d00e821126ba797ecebc46f6d57ae4b92d1a2f9b5b457f8065baf0\" returns successfully" May 16 00:52:37.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit: BPF prog-id=107 op=LOAD May 16 00:52:37.582000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936656639653230633232646162383233646235626233653532333233 May 16 00:52:37.582000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.582000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936656639653230633232646162383233646235626233653532333233 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.583000 audit: BPF prog-id=108 op=LOAD May 16 00:52:37.583000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936656639653230633232646162383233646235626233653532333233 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.584000 audit: BPF prog-id=109 op=LOAD May 16 00:52:37.584000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936656639653230633232646162383233646235626233653532333233 May 16 00:52:37.586000 audit: BPF prog-id=109 op=UNLOAD May 16 00:52:37.586000 audit: BPF prog-id=108 op=UNLOAD May 16 00:52:37.586000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { perfmon } for pid=2107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit[2107]: AVC avc: denied { bpf } for pid=2107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:37.586000 audit: BPF prog-id=110 op=LOAD May 16 00:52:37.586000 audit[2107]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2096 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936656639653230633232646162383233646235626233653532333233 May 16 00:52:37.607284 kubelet[1970]: E0516 00:52:37.606832 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:37.608197 env[1219]: time="2025-05-16T00:52:37.608161352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-sfxmt,Uid:1c63207a-b9cd-47bc-85d3-17bf0824e8db,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"96ef9e20c22dab823db5bb3e52323f5070120dd4d461bc68101f5e07cb7e6266\"" May 16 00:52:37.610907 env[1219]: time="2025-05-16T00:52:37.610854793Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 16 00:52:37.769000 audit[2177]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.769000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc2262450 a2=0 a3=1 items=0 ppid=2082 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.769000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 16 00:52:37.769000 audit[2178]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.769000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe68b5170 a2=0 a3=1 items=0 ppid=2082 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.769000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 16 00:52:37.770000 audit[2181]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.770000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe4d7a840 a2=0 a3=1 items=0 ppid=2082 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 16 00:52:37.773000 audit[2183]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.773000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9704a30 a2=0 a3=1 items=0 ppid=2082 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 16 00:52:37.774000 audit[2184]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.774000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff56ec440 a2=0 a3=1 items=0 ppid=2082 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 16 00:52:37.775000 audit[2185]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.775000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdc8a50d0 a2=0 a3=1 items=0 ppid=2082 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 16 00:52:37.871000 audit[2186]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.871000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff29f1c80 a2=0 a3=1 items=0 ppid=2082 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 16 00:52:37.875000 audit[2188]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.875000 audit[2188]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffe3bba70 a2=0 a3=1 items=0 ppid=2082 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 16 00:52:37.880000 audit[2191]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.880000 audit[2191]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffff3d517d0 a2=0 a3=1 items=0 ppid=2082 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 16 00:52:37.881000 audit[2192]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.881000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec5c8560 a2=0 a3=1 items=0 ppid=2082 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 16 00:52:37.883000 audit[2194]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.883000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc3f54170 a2=0 a3=1 items=0 ppid=2082 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 16 00:52:37.884000 audit[2195]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.884000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff06c9330 a2=0 a3=1 items=0 ppid=2082 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 16 00:52:37.886000 audit[2197]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2197 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.886000 audit[2197]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd06b6ca0 a2=0 a3=1 items=0 ppid=2082 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 16 00:52:37.889000 audit[2200]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.889000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffffa1e5770 a2=0 a3=1 items=0 ppid=2082 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 16 00:52:37.890000 audit[2201]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.890000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4dbf180 a2=0 a3=1 items=0 ppid=2082 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 16 00:52:37.892000 audit[2203]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.892000 audit[2203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7bdd2c0 a2=0 a3=1 items=0 ppid=2082 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 16 00:52:37.893000 audit[2204]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.893000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcd9f4b40 a2=0 a3=1 items=0 ppid=2082 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 16 00:52:37.895000 audit[2206]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.895000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe3cc90d0 a2=0 a3=1 items=0 ppid=2082 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:52:37.898000 audit[2209]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.898000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe21be090 a2=0 a3=1 items=0 ppid=2082 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:52:37.901000 audit[2212]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.901000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff27b2f20 a2=0 a3=1 items=0 ppid=2082 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.901000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 16 00:52:37.902000 audit[2213]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.902000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffe2ede90 a2=0 a3=1 items=0 ppid=2082 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 16 00:52:37.905000 audit[2215]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.905000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdf0742e0 a2=0 a3=1 items=0 ppid=2082 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:52:37.908000 audit[2218]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.908000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffdb11440 a2=0 a3=1 items=0 ppid=2082 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.908000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:52:37.909000 audit[2219]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.909000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd9e5b5b0 a2=0 a3=1 items=0 ppid=2082 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 16 00:52:37.911000 audit[2221]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 16 00:52:37.911000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff2d7f070 a2=0 a3=1 items=0 ppid=2082 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 16 00:52:37.930000 audit[2227]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:37.930000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffed21a400 a2=0 a3=1 items=0 ppid=2082 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.930000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:37.942000 audit[2227]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:37.942000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffed21a400 a2=0 a3=1 items=0 ppid=2082 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.942000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:37.943000 audit[2232]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.943000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd7e883d0 a2=0 a3=1 items=0 ppid=2082 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.943000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 16 00:52:37.946677 kubelet[1970]: E0516 00:52:37.945867 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:37.946000 audit[2234]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.946000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd428df60 a2=0 a3=1 items=0 ppid=2082 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.946000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 16 00:52:37.951000 audit[2237]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.951000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd59a6050 a2=0 a3=1 items=0 ppid=2082 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 16 00:52:37.952000 audit[2238]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.952000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc41d1530 a2=0 a3=1 items=0 ppid=2082 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.952000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 16 00:52:37.955000 audit[2240]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.955000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffecb82d20 a2=0 a3=1 items=0 ppid=2082 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 16 00:52:37.957000 audit[2241]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.957000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc153fbf0 a2=0 a3=1 items=0 ppid=2082 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.957000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 16 00:52:37.960000 audit[2243]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.960000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffde9dfc20 a2=0 a3=1 items=0 ppid=2082 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 16 00:52:37.962610 kubelet[1970]: I0516 00:52:37.962551 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-sk9r6" podStartSLOduration=0.962536296 podStartE2EDuration="962.536296ms" podCreationTimestamp="2025-05-16 00:52:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:52:37.617134035 +0000 UTC m=+7.123771167" watchObservedRunningTime="2025-05-16 00:52:37.962536296 +0000 UTC m=+7.469173388" May 16 00:52:37.965000 audit[2246]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.965000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff6ef59d0 a2=0 a3=1 items=0 ppid=2082 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.965000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 16 00:52:37.966000 audit[2247]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.966000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0f465f0 a2=0 a3=1 items=0 ppid=2082 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 16 00:52:37.968000 audit[2249]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.968000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff8d85d20 a2=0 a3=1 items=0 ppid=2082 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 16 00:52:37.969000 audit[2250]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.969000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc95807f0 a2=0 a3=1 items=0 ppid=2082 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 16 00:52:37.971000 audit[2252]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.971000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc2200ab0 a2=0 a3=1 items=0 ppid=2082 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 16 00:52:37.974000 audit[2255]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.974000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff76cdea0 a2=0 a3=1 items=0 ppid=2082 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 16 00:52:37.977000 audit[2258]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.977000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdc65be50 a2=0 a3=1 items=0 ppid=2082 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 16 00:52:37.978000 audit[2259]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.978000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff25433c0 a2=0 a3=1 items=0 ppid=2082 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 16 00:52:37.980000 audit[2261]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.980000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd1f71e90 a2=0 a3=1 items=0 ppid=2082 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:52:37.983000 audit[2264]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.983000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe3975e60 a2=0 a3=1 items=0 ppid=2082 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 16 00:52:37.984000 audit[2265]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.984000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc52a9cc0 a2=0 a3=1 items=0 ppid=2082 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 16 00:52:37.986000 audit[2267]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.986000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffe0dcc5b0 a2=0 a3=1 items=0 ppid=2082 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 16 00:52:37.987000 audit[2268]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.987000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff3a2a10 a2=0 a3=1 items=0 ppid=2082 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 16 00:52:37.989000 audit[2270]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.989000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffee2834d0 a2=0 a3=1 items=0 ppid=2082 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.989000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:52:37.992000 audit[2273]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 16 00:52:37.992000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe724d1a0 a2=0 a3=1 items=0 ppid=2082 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.992000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 16 00:52:37.995000 audit[2275]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 16 00:52:37.995000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffca851dd0 a2=0 a3=1 items=0 ppid=2082 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.995000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:37.995000 audit[2275]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 16 00:52:37.995000 audit[2275]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffca851dd0 a2=0 a3=1 items=0 ppid=2082 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:37.995000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:38.336830 kubelet[1970]: E0516 00:52:38.336787 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:38.609742 kubelet[1970]: E0516 00:52:38.609625 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:38.610043 kubelet[1970]: E0516 00:52:38.609790 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:38.748966 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1597511419.mount: Deactivated successfully. May 16 00:52:39.572375 env[1219]: time="2025-05-16T00:52:39.572325591Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:39.573808 env[1219]: time="2025-05-16T00:52:39.573771325Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:39.575206 env[1219]: time="2025-05-16T00:52:39.575177694Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:39.576485 env[1219]: time="2025-05-16T00:52:39.576457928Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:39.577042 env[1219]: time="2025-05-16T00:52:39.577014235Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:171854d50ba608218142ad5d32c7dd12ce55d536f02872e56e7c04c1f0a96a6b\"" May 16 00:52:39.580977 env[1219]: time="2025-05-16T00:52:39.580946628Z" level=info msg="CreateContainer within sandbox \"96ef9e20c22dab823db5bb3e52323f5070120dd4d461bc68101f5e07cb7e6266\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 16 00:52:39.592005 env[1219]: time="2025-05-16T00:52:39.591959751Z" level=info msg="CreateContainer within sandbox \"96ef9e20c22dab823db5bb3e52323f5070120dd4d461bc68101f5e07cb7e6266\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"120f3edc47d8eaea60da7904f27039061d3189f2510cc36ef591382cc8011f27\"" May 16 00:52:39.592436 env[1219]: time="2025-05-16T00:52:39.592409366Z" level=info msg="StartContainer for \"120f3edc47d8eaea60da7904f27039061d3189f2510cc36ef591382cc8011f27\"" May 16 00:52:39.620124 systemd[1]: run-containerd-runc-k8s.io-120f3edc47d8eaea60da7904f27039061d3189f2510cc36ef591382cc8011f27-runc.8XdqKU.mount: Deactivated successfully. May 16 00:52:39.622333 systemd[1]: Started cri-containerd-120f3edc47d8eaea60da7904f27039061d3189f2510cc36ef591382cc8011f27.scope. May 16 00:52:39.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642962 kernel: kauditd_printk_skb: 303 callbacks suppressed May 16 00:52:39.642997 kernel: audit: type=1400 audit(1747356759.641:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646489 kernel: audit: type=1400 audit(1747356759.641:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646549 kernel: audit: type=1400 audit(1747356759.641:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.648277 kernel: audit: type=1400 audit(1747356759.641:912): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.651851 kernel: audit: type=1400 audit(1747356759.641:913): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.651904 kernel: audit: type=1400 audit(1747356759.641:914): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.655455 kernel: audit: type=1400 audit(1747356759.641:915): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.655511 kernel: audit: type=1400 audit(1747356759.641:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.657258 kernel: audit: type=1400 audit(1747356759.641:917): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.659183 kernel: audit: type=1400 audit(1747356759.642:918): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit: BPF prog-id=111 op=LOAD May 16 00:52:39.642000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2096 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306633656463343764386561656136306461373930346632373033 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2096 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306633656463343764386561656136306461373930346632373033 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.642000 audit: BPF prog-id=112 op=LOAD May 16 00:52:39.642000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2096 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306633656463343764386561656136306461373930346632373033 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.644000 audit: BPF prog-id=113 op=LOAD May 16 00:52:39.644000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2096 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.644000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306633656463343764386561656136306461373930346632373033 May 16 00:52:39.646000 audit: BPF prog-id=113 op=UNLOAD May 16 00:52:39.646000 audit: BPF prog-id=112 op=UNLOAD May 16 00:52:39.646000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:39.646000 audit: BPF prog-id=114 op=LOAD May 16 00:52:39.646000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2096 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:39.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132306633656463343764386561656136306461373930346632373033 May 16 00:52:39.675754 env[1219]: time="2025-05-16T00:52:39.669893680Z" level=info msg="StartContainer for \"120f3edc47d8eaea60da7904f27039061d3189f2510cc36ef591382cc8011f27\" returns successfully" May 16 00:52:43.297764 kubelet[1970]: E0516 00:52:43.297725 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:43.305677 kubelet[1970]: I0516 00:52:43.305622 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-sfxmt" podStartSLOduration=4.338083578 podStartE2EDuration="6.305610429s" podCreationTimestamp="2025-05-16 00:52:37 +0000 UTC" firstStartedPulling="2025-05-16 00:52:37.610541871 +0000 UTC m=+7.117178963" lastFinishedPulling="2025-05-16 00:52:39.578068682 +0000 UTC m=+9.084705814" observedRunningTime="2025-05-16 00:52:40.624599448 +0000 UTC m=+10.131236540" watchObservedRunningTime="2025-05-16 00:52:43.305610429 +0000 UTC m=+12.812247561" May 16 00:52:45.012807 update_engine[1212]: I0516 00:52:45.012763 1212 update_attempter.cc:509] Updating boot flags... May 16 00:52:45.088741 kernel: kauditd_printk_skb: 47 callbacks suppressed May 16 00:52:45.088864 kernel: audit: type=1106 audit(1747356765.084:927): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:45.084000 audit[1360]: USER_END pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:45.086474 sudo[1360]: pam_unix(sudo:session): session closed for user root May 16 00:52:45.084000 audit[1360]: CRED_DISP pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:45.092768 kernel: audit: type=1104 audit(1747356765.084:928): pid=1360 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 16 00:52:45.094289 sshd[1355]: pam_unix(sshd:session): session closed for user core May 16 00:52:45.101000 audit[1355]: USER_END pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.104356 systemd[1]: sshd@6-10.0.0.134:22-10.0.0.1:51228.service: Deactivated successfully. May 16 00:52:45.105008 systemd[1]: session-7.scope: Deactivated successfully. May 16 00:52:45.105141 systemd[1]: session-7.scope: Consumed 6.644s CPU time. May 16 00:52:45.101000 audit[1355]: CRED_DISP pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.107693 kernel: audit: type=1106 audit(1747356765.101:929): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.107791 kernel: audit: type=1104 audit(1747356765.101:930): pid=1355 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:52:45.107814 kernel: audit: type=1131 audit(1747356765.102:931): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.134:22-10.0.0.1:51228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:45.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.134:22-10.0.0.1:51228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:52:45.114080 systemd-logind[1209]: Session 7 logged out. Waiting for processes to exit. May 16 00:52:45.117464 systemd-logind[1209]: Removed session 7. May 16 00:52:46.395000 audit[2386]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:46.395000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe34f3a40 a2=0 a3=1 items=0 ppid=2082 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:46.402129 kernel: audit: type=1325 audit(1747356766.395:932): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:46.402200 kernel: audit: type=1300 audit(1747356766.395:932): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe34f3a40 a2=0 a3=1 items=0 ppid=2082 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:46.402222 kernel: audit: type=1327 audit(1747356766.395:932): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:46.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:46.406000 audit[2386]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:46.408728 kernel: audit: type=1325 audit(1747356766.406:933): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:46.406000 audit[2386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe34f3a40 a2=0 a3=1 items=0 ppid=2082 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:46.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:46.412737 kernel: audit: type=1300 audit(1747356766.406:933): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe34f3a40 a2=0 a3=1 items=0 ppid=2082 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:46.421000 audit[2388]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:46.421000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffd9ea4b90 a2=0 a3=1 items=0 ppid=2082 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:46.421000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:46.426000 audit[2388]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:46.426000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd9ea4b90 a2=0 a3=1 items=0 ppid=2082 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:46.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.244000 audit[2390]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.246265 kernel: kauditd_printk_skb: 7 callbacks suppressed May 16 00:52:50.246336 kernel: audit: type=1325 audit(1747356770.244:936): table=filter:93 family=2 entries=17 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.244000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd2f32280 a2=0 a3=1 items=0 ppid=2082 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.256709 kernel: audit: type=1300 audit(1747356770.244:936): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffd2f32280 a2=0 a3=1 items=0 ppid=2082 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.256798 kernel: audit: type=1327 audit(1747356770.244:936): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.257000 audit[2390]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.259755 kernel: audit: type=1325 audit(1747356770.257:937): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.257000 audit[2390]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd2f32280 a2=0 a3=1 items=0 ppid=2082 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.257000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.265269 kernel: audit: type=1300 audit(1747356770.257:937): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd2f32280 a2=0 a3=1 items=0 ppid=2082 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.265347 kernel: audit: type=1327 audit(1747356770.257:937): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.273376 systemd[1]: Created slice kubepods-besteffort-pod25e93abe_3b21_473f_bbcb_4372914d7f56.slice. May 16 00:52:50.278000 audit[2392]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.278000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffca541c60 a2=0 a3=1 items=0 ppid=2082 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.283346 kubelet[1970]: I0516 00:52:50.283297 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/25e93abe-3b21-473f-bbcb-4372914d7f56-tigera-ca-bundle\") pod \"calico-typha-67ffd67967-kxsrg\" (UID: \"25e93abe-3b21-473f-bbcb-4372914d7f56\") " pod="calico-system/calico-typha-67ffd67967-kxsrg" May 16 00:52:50.283346 kubelet[1970]: I0516 00:52:50.283340 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-sbzf9\" (UniqueName: \"kubernetes.io/projected/25e93abe-3b21-473f-bbcb-4372914d7f56-kube-api-access-sbzf9\") pod \"calico-typha-67ffd67967-kxsrg\" (UID: \"25e93abe-3b21-473f-bbcb-4372914d7f56\") " pod="calico-system/calico-typha-67ffd67967-kxsrg" May 16 00:52:50.283609 kubelet[1970]: I0516 00:52:50.283360 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/25e93abe-3b21-473f-bbcb-4372914d7f56-typha-certs\") pod \"calico-typha-67ffd67967-kxsrg\" (UID: \"25e93abe-3b21-473f-bbcb-4372914d7f56\") " pod="calico-system/calico-typha-67ffd67967-kxsrg" May 16 00:52:50.283728 kernel: audit: type=1325 audit(1747356770.278:938): table=filter:95 family=2 entries=18 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.283786 kernel: audit: type=1300 audit(1747356770.278:938): arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=ffffca541c60 a2=0 a3=1 items=0 ppid=2082 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.283809 kernel: audit: type=1327 audit(1747356770.278:938): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.288000 audit[2392]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.288000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffca541c60 a2=0 a3=1 items=0 ppid=2082 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.288000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:50.291742 kernel: audit: type=1325 audit(1747356770.288:939): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:50.455926 systemd[1]: Created slice kubepods-besteffort-pod4bbfa556_6164_4ec5_911a_15817867e1ea.slice. May 16 00:52:50.484100 kubelet[1970]: I0516 00:52:50.484048 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-cni-net-dir\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484100 kubelet[1970]: I0516 00:52:50.484090 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4bbfa556-6164-4ec5-911a-15817867e1ea-node-certs\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484293 kubelet[1970]: I0516 00:52:50.484111 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6tpzr\" (UniqueName: \"kubernetes.io/projected/4bbfa556-6164-4ec5-911a-15817867e1ea-kube-api-access-6tpzr\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484293 kubelet[1970]: I0516 00:52:50.484137 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-cni-log-dir\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484293 kubelet[1970]: I0516 00:52:50.484158 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-flexvol-driver-host\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484293 kubelet[1970]: I0516 00:52:50.484222 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-lib-modules\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484293 kubelet[1970]: I0516 00:52:50.484274 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-policysync\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484408 kubelet[1970]: I0516 00:52:50.484291 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-var-lib-calico\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484408 kubelet[1970]: I0516 00:52:50.484312 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-var-run-calico\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484408 kubelet[1970]: I0516 00:52:50.484326 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-xtables-lock\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484408 kubelet[1970]: I0516 00:52:50.484365 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4bbfa556-6164-4ec5-911a-15817867e1ea-cni-bin-dir\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.484408 kubelet[1970]: I0516 00:52:50.484385 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4bbfa556-6164-4ec5-911a-15817867e1ea-tigera-ca-bundle\") pod \"calico-node-wl4kg\" (UID: \"4bbfa556-6164-4ec5-911a-15817867e1ea\") " pod="calico-system/calico-node-wl4kg" May 16 00:52:50.577417 kubelet[1970]: E0516 00:52:50.577299 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:50.578021 env[1219]: time="2025-05-16T00:52:50.577968114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-67ffd67967-kxsrg,Uid:25e93abe-3b21-473f-bbcb-4372914d7f56,Namespace:calico-system,Attempt:0,}" May 16 00:52:50.586042 kubelet[1970]: E0516 00:52:50.586002 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.586042 kubelet[1970]: W0516 00:52:50.586027 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.587523 kubelet[1970]: E0516 00:52:50.587492 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.587793 kubelet[1970]: E0516 00:52:50.587743 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.587793 kubelet[1970]: W0516 00:52:50.587785 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.587889 kubelet[1970]: E0516 00:52:50.587800 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.588061 kubelet[1970]: E0516 00:52:50.588038 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.588061 kubelet[1970]: W0516 00:52:50.588054 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.588143 kubelet[1970]: E0516 00:52:50.588066 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.590756 kubelet[1970]: E0516 00:52:50.588389 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.590756 kubelet[1970]: W0516 00:52:50.588406 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.590756 kubelet[1970]: E0516 00:52:50.588418 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.590756 kubelet[1970]: E0516 00:52:50.588651 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.590756 kubelet[1970]: W0516 00:52:50.588660 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.590756 kubelet[1970]: E0516 00:52:50.588669 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.590756 kubelet[1970]: E0516 00:52:50.588894 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.590756 kubelet[1970]: W0516 00:52:50.588905 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.590756 kubelet[1970]: E0516 00:52:50.588915 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.590756 kubelet[1970]: E0516 00:52:50.589070 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.591051 kubelet[1970]: W0516 00:52:50.589078 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.591051 kubelet[1970]: E0516 00:52:50.589088 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.591051 kubelet[1970]: E0516 00:52:50.589232 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.591051 kubelet[1970]: W0516 00:52:50.589240 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.591051 kubelet[1970]: E0516 00:52:50.589248 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.591051 kubelet[1970]: E0516 00:52:50.589389 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.591051 kubelet[1970]: W0516 00:52:50.589396 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.591051 kubelet[1970]: E0516 00:52:50.589403 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.591051 kubelet[1970]: E0516 00:52:50.589659 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.591051 kubelet[1970]: W0516 00:52:50.589669 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.591312 kubelet[1970]: E0516 00:52:50.589677 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.591312 kubelet[1970]: E0516 00:52:50.589931 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.591312 kubelet[1970]: W0516 00:52:50.589940 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.591312 kubelet[1970]: E0516 00:52:50.589950 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.595907 kubelet[1970]: E0516 00:52:50.595868 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.595907 kubelet[1970]: W0516 00:52:50.595899 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.596021 kubelet[1970]: E0516 00:52:50.595916 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.596398 kubelet[1970]: E0516 00:52:50.596257 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.596398 kubelet[1970]: W0516 00:52:50.596269 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.596398 kubelet[1970]: E0516 00:52:50.596281 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.598075 env[1219]: time="2025-05-16T00:52:50.597313012Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:50.598075 env[1219]: time="2025-05-16T00:52:50.597366495Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:50.598075 env[1219]: time="2025-05-16T00:52:50.597377496Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:50.598075 env[1219]: time="2025-05-16T00:52:50.597544508Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/009046a1a8fc17a3f8de7ddf9c4f13f576b51c12b2cdb83cf7f9be6bbdf40c90 pid=2414 runtime=io.containerd.runc.v2 May 16 00:52:50.598491 kubelet[1970]: E0516 00:52:50.598459 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.598491 kubelet[1970]: W0516 00:52:50.598479 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.598491 kubelet[1970]: E0516 00:52:50.598492 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.601833 kubelet[1970]: E0516 00:52:50.601820 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.601872 kubelet[1970]: W0516 00:52:50.601834 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.601872 kubelet[1970]: E0516 00:52:50.601855 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.611092 kubelet[1970]: E0516 00:52:50.610079 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.611092 kubelet[1970]: W0516 00:52:50.610118 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.611092 kubelet[1970]: E0516 00:52:50.610142 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.611092 kubelet[1970]: E0516 00:52:50.611023 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.611092 kubelet[1970]: W0516 00:52:50.611048 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.611092 kubelet[1970]: E0516 00:52:50.611062 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.613793 kubelet[1970]: E0516 00:52:50.612946 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.613793 kubelet[1970]: W0516 00:52:50.612961 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.613793 kubelet[1970]: E0516 00:52:50.612972 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.613793 kubelet[1970]: E0516 00:52:50.613525 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.613793 kubelet[1970]: W0516 00:52:50.613536 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.613793 kubelet[1970]: E0516 00:52:50.613546 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.614010 kubelet[1970]: E0516 00:52:50.613859 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.614010 kubelet[1970]: W0516 00:52:50.613872 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.614010 kubelet[1970]: E0516 00:52:50.613882 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.614594 kubelet[1970]: E0516 00:52:50.614480 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.616965 kubelet[1970]: W0516 00:52:50.615464 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.616965 kubelet[1970]: E0516 00:52:50.615591 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.628916 kubelet[1970]: E0516 00:52:50.628862 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.629118 kubelet[1970]: W0516 00:52:50.629098 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.629229 kubelet[1970]: E0516 00:52:50.629214 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.630129 kubelet[1970]: E0516 00:52:50.630108 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.630282 kubelet[1970]: W0516 00:52:50.630265 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.630427 kubelet[1970]: E0516 00:52:50.630387 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.630829 kubelet[1970]: E0516 00:52:50.630790 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.630955 kubelet[1970]: W0516 00:52:50.630939 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.631069 kubelet[1970]: E0516 00:52:50.631038 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.646542 kubelet[1970]: E0516 00:52:50.646511 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.646710 kubelet[1970]: W0516 00:52:50.646691 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.646812 kubelet[1970]: E0516 00:52:50.646796 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.647170 kubelet[1970]: E0516 00:52:50.647155 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.647249 kubelet[1970]: W0516 00:52:50.647235 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.647305 kubelet[1970]: E0516 00:52:50.647294 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.647617 kubelet[1970]: E0516 00:52:50.647602 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.647699 kubelet[1970]: W0516 00:52:50.647685 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.647772 kubelet[1970]: E0516 00:52:50.647760 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.650332 kubelet[1970]: E0516 00:52:50.650313 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.650446 kubelet[1970]: W0516 00:52:50.650430 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.650539 kubelet[1970]: E0516 00:52:50.650526 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.653866 kubelet[1970]: E0516 00:52:50.653843 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.653988 kubelet[1970]: W0516 00:52:50.653971 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.654053 kubelet[1970]: E0516 00:52:50.654040 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.657930 kubelet[1970]: E0516 00:52:50.657909 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.658086 kubelet[1970]: W0516 00:52:50.658069 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.658245 kubelet[1970]: E0516 00:52:50.658229 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.659017 kubelet[1970]: E0516 00:52:50.658999 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.659123 kubelet[1970]: W0516 00:52:50.659108 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.659234 kubelet[1970]: E0516 00:52:50.659220 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.660111 kubelet[1970]: E0516 00:52:50.660092 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.660230 kubelet[1970]: W0516 00:52:50.660214 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.660324 kubelet[1970]: E0516 00:52:50.660311 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.664042 kubelet[1970]: E0516 00:52:50.664007 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.664203 kubelet[1970]: W0516 00:52:50.664168 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.664293 kubelet[1970]: E0516 00:52:50.664280 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.670147 kubelet[1970]: E0516 00:52:50.670118 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.670270 kubelet[1970]: W0516 00:52:50.670253 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.670369 kubelet[1970]: E0516 00:52:50.670351 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.673190 systemd[1]: Started cri-containerd-009046a1a8fc17a3f8de7ddf9c4f13f576b51c12b2cdb83cf7f9be6bbdf40c90.scope. May 16 00:52:50.674801 kubelet[1970]: E0516 00:52:50.674785 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.674909 kubelet[1970]: W0516 00:52:50.674894 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.674980 kubelet[1970]: E0516 00:52:50.674968 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.675309 kubelet[1970]: E0516 00:52:50.675296 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.675490 kubelet[1970]: W0516 00:52:50.675479 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.675609 kubelet[1970]: E0516 00:52:50.675594 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.683273 kubelet[1970]: E0516 00:52:50.683245 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.683420 kubelet[1970]: W0516 00:52:50.683402 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.683486 kubelet[1970]: E0516 00:52:50.683473 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.725027 kubelet[1970]: E0516 00:52:50.724981 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qqqzr" podUID="0fcc127d-35ef-42b4-989b-8f2570d7bd7f" May 16 00:52:50.758405 env[1219]: time="2025-05-16T00:52:50.758354026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wl4kg,Uid:4bbfa556-6164-4ec5-911a-15817867e1ea,Namespace:calico-system,Attempt:0,}" May 16 00:52:50.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit: BPF prog-id=115 op=LOAD May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2414 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030393034366131613866633137613366386465376464663963346631 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2414 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030393034366131613866633137613366386465376464663963346631 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit: BPF prog-id=116 op=LOAD May 16 00:52:50.777000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2414 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030393034366131613866633137613366386465376464663963346631 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.777000 audit: BPF prog-id=117 op=LOAD May 16 00:52:50.777000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2414 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030393034366131613866633137613366386465376464663963346631 May 16 00:52:50.778000 audit: BPF prog-id=117 op=UNLOAD May 16 00:52:50.778000 audit: BPF prog-id=116 op=UNLOAD May 16 00:52:50.778000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.778000 audit: BPF prog-id=118 op=LOAD May 16 00:52:50.778000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2414 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030393034366131613866633137613366386465376464663963346631 May 16 00:52:50.780285 env[1219]: time="2025-05-16T00:52:50.780205577Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:52:50.780285 env[1219]: time="2025-05-16T00:52:50.780265861Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:52:50.780285 env[1219]: time="2025-05-16T00:52:50.780277101Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:52:50.780546 env[1219]: time="2025-05-16T00:52:50.780515038Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72 pid=2476 runtime=io.containerd.runc.v2 May 16 00:52:50.782314 kubelet[1970]: E0516 00:52:50.782292 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.782414 kubelet[1970]: W0516 00:52:50.782397 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.782479 kubelet[1970]: E0516 00:52:50.782463 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.782704 kubelet[1970]: E0516 00:52:50.782692 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.785155 kubelet[1970]: W0516 00:52:50.782794 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.785256 kubelet[1970]: E0516 00:52:50.785240 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.785523 kubelet[1970]: E0516 00:52:50.785503 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.785622 kubelet[1970]: W0516 00:52:50.785601 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.785706 kubelet[1970]: E0516 00:52:50.785692 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.786021 kubelet[1970]: E0516 00:52:50.786006 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.786122 kubelet[1970]: W0516 00:52:50.786107 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.786235 kubelet[1970]: E0516 00:52:50.786189 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.786502 kubelet[1970]: E0516 00:52:50.786488 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.786591 kubelet[1970]: W0516 00:52:50.786576 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.786648 kubelet[1970]: E0516 00:52:50.786637 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.786904 kubelet[1970]: E0516 00:52:50.786891 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.786997 kubelet[1970]: W0516 00:52:50.786984 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.787186 kubelet[1970]: E0516 00:52:50.787168 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.787407 kubelet[1970]: E0516 00:52:50.787395 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.787480 kubelet[1970]: W0516 00:52:50.787468 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.787536 kubelet[1970]: E0516 00:52:50.787524 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.787873 kubelet[1970]: E0516 00:52:50.787858 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.787979 kubelet[1970]: W0516 00:52:50.787957 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.788049 kubelet[1970]: E0516 00:52:50.788037 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.788310 kubelet[1970]: E0516 00:52:50.788297 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.788457 kubelet[1970]: W0516 00:52:50.788439 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.788532 kubelet[1970]: E0516 00:52:50.788519 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.788800 kubelet[1970]: E0516 00:52:50.788788 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.788885 kubelet[1970]: W0516 00:52:50.788871 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.788943 kubelet[1970]: E0516 00:52:50.788930 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.789233 kubelet[1970]: E0516 00:52:50.789220 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.789368 kubelet[1970]: W0516 00:52:50.789352 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.789511 kubelet[1970]: E0516 00:52:50.789496 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.790000 kubelet[1970]: E0516 00:52:50.789985 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.790103 kubelet[1970]: W0516 00:52:50.790088 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.790219 kubelet[1970]: E0516 00:52:50.790188 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.791428 kubelet[1970]: E0516 00:52:50.791410 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.791611 systemd[1]: Started cri-containerd-f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72.scope. May 16 00:52:50.791821 kubelet[1970]: W0516 00:52:50.791804 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.793913 kubelet[1970]: E0516 00:52:50.793894 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.794898 kubelet[1970]: E0516 00:52:50.794881 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.795000 kubelet[1970]: W0516 00:52:50.794985 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.795102 kubelet[1970]: E0516 00:52:50.795087 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.796011 kubelet[1970]: E0516 00:52:50.795993 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.796111 kubelet[1970]: W0516 00:52:50.796097 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.796203 kubelet[1970]: E0516 00:52:50.796189 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.796646 kubelet[1970]: E0516 00:52:50.796628 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.796780 kubelet[1970]: W0516 00:52:50.796764 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.796845 kubelet[1970]: E0516 00:52:50.796833 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.797116 kubelet[1970]: E0516 00:52:50.797101 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.797204 kubelet[1970]: W0516 00:52:50.797189 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.797274 kubelet[1970]: E0516 00:52:50.797261 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.797504 kubelet[1970]: E0516 00:52:50.797491 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.797576 kubelet[1970]: W0516 00:52:50.797562 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.797633 kubelet[1970]: E0516 00:52:50.797620 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.797986 kubelet[1970]: E0516 00:52:50.797971 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.798076 kubelet[1970]: W0516 00:52:50.798062 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.798226 kubelet[1970]: E0516 00:52:50.798210 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.798478 kubelet[1970]: E0516 00:52:50.798465 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.798561 kubelet[1970]: W0516 00:52:50.798546 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.798619 kubelet[1970]: E0516 00:52:50.798608 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.803734 env[1219]: time="2025-05-16T00:52:50.801923838Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-67ffd67967-kxsrg,Uid:25e93abe-3b21-473f-bbcb-4372914d7f56,Namespace:calico-system,Attempt:0,} returns sandbox id \"009046a1a8fc17a3f8de7ddf9c4f13f576b51c12b2cdb83cf7f9be6bbdf40c90\"" May 16 00:52:50.803734 env[1219]: time="2025-05-16T00:52:50.803405741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 16 00:52:50.803905 kubelet[1970]: E0516 00:52:50.802409 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:50.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.812000 audit: BPF prog-id=119 op=LOAD May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303766333535306466636365626332303563646462336464373338 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303766333535306466636365626332303563646462336464373338 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit: BPF prog-id=120 op=LOAD May 16 00:52:50.813000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303766333535306466636365626332303563646462336464373338 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit: BPF prog-id=121 op=LOAD May 16 00:52:50.813000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303766333535306466636365626332303563646462336464373338 May 16 00:52:50.813000 audit: BPF prog-id=121 op=UNLOAD May 16 00:52:50.813000 audit: BPF prog-id=120 op=UNLOAD May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { perfmon } for pid=2486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit[2486]: AVC avc: denied { bpf } for pid=2486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:50.813000 audit: BPF prog-id=122 op=LOAD May 16 00:52:50.813000 audit[2486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2476 pid=2486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:50.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639303766333535306466636365626332303563646462336464373338 May 16 00:52:50.816708 kubelet[1970]: E0516 00:52:50.815194 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.816708 kubelet[1970]: W0516 00:52:50.815228 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.816708 kubelet[1970]: E0516 00:52:50.815243 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.816708 kubelet[1970]: I0516 00:52:50.815269 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/0fcc127d-35ef-42b4-989b-8f2570d7bd7f-socket-dir\") pod \"csi-node-driver-qqqzr\" (UID: \"0fcc127d-35ef-42b4-989b-8f2570d7bd7f\") " pod="calico-system/csi-node-driver-qqqzr" May 16 00:52:50.816708 kubelet[1970]: E0516 00:52:50.815510 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.816708 kubelet[1970]: W0516 00:52:50.815522 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.816708 kubelet[1970]: E0516 00:52:50.815533 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.816708 kubelet[1970]: I0516 00:52:50.815565 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/0fcc127d-35ef-42b4-989b-8f2570d7bd7f-registration-dir\") pod \"csi-node-driver-qqqzr\" (UID: \"0fcc127d-35ef-42b4-989b-8f2570d7bd7f\") " pod="calico-system/csi-node-driver-qqqzr" May 16 00:52:50.816708 kubelet[1970]: E0516 00:52:50.815897 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.816917 kubelet[1970]: W0516 00:52:50.815910 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.816917 kubelet[1970]: E0516 00:52:50.815925 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.816917 kubelet[1970]: E0516 00:52:50.816246 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.816917 kubelet[1970]: W0516 00:52:50.816258 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.816917 kubelet[1970]: E0516 00:52:50.816268 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.816917 kubelet[1970]: E0516 00:52:50.816442 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.816917 kubelet[1970]: W0516 00:52:50.816451 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.816917 kubelet[1970]: E0516 00:52:50.816460 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.816917 kubelet[1970]: I0516 00:52:50.816483 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bf4jd\" (UniqueName: \"kubernetes.io/projected/0fcc127d-35ef-42b4-989b-8f2570d7bd7f-kube-api-access-bf4jd\") pod \"csi-node-driver-qqqzr\" (UID: \"0fcc127d-35ef-42b4-989b-8f2570d7bd7f\") " pod="calico-system/csi-node-driver-qqqzr" May 16 00:52:50.817318 kubelet[1970]: E0516 00:52:50.817196 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.817318 kubelet[1970]: W0516 00:52:50.817214 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.817318 kubelet[1970]: E0516 00:52:50.817225 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.817318 kubelet[1970]: I0516 00:52:50.817241 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/0fcc127d-35ef-42b4-989b-8f2570d7bd7f-varrun\") pod \"csi-node-driver-qqqzr\" (UID: \"0fcc127d-35ef-42b4-989b-8f2570d7bd7f\") " pod="calico-system/csi-node-driver-qqqzr" May 16 00:52:50.817454 kubelet[1970]: E0516 00:52:50.817425 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.817489 kubelet[1970]: W0516 00:52:50.817455 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.817489 kubelet[1970]: E0516 00:52:50.817464 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.817607 kubelet[1970]: I0516 00:52:50.817562 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/0fcc127d-35ef-42b4-989b-8f2570d7bd7f-kubelet-dir\") pod \"csi-node-driver-qqqzr\" (UID: \"0fcc127d-35ef-42b4-989b-8f2570d7bd7f\") " pod="calico-system/csi-node-driver-qqqzr" May 16 00:52:50.817691 kubelet[1970]: E0516 00:52:50.817666 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.817691 kubelet[1970]: W0516 00:52:50.817680 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.817691 kubelet[1970]: E0516 00:52:50.817691 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.817895 kubelet[1970]: E0516 00:52:50.817873 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.817895 kubelet[1970]: W0516 00:52:50.817892 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.817968 kubelet[1970]: E0516 00:52:50.817901 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.819085 kubelet[1970]: E0516 00:52:50.818315 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.819085 kubelet[1970]: W0516 00:52:50.818328 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.819085 kubelet[1970]: E0516 00:52:50.818340 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.819085 kubelet[1970]: E0516 00:52:50.818597 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.819085 kubelet[1970]: W0516 00:52:50.818606 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.819085 kubelet[1970]: E0516 00:52:50.818616 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.819289 kubelet[1970]: E0516 00:52:50.819252 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.819289 kubelet[1970]: W0516 00:52:50.819264 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.819289 kubelet[1970]: E0516 00:52:50.819275 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.819483 kubelet[1970]: E0516 00:52:50.819466 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.819483 kubelet[1970]: W0516 00:52:50.819480 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.819557 kubelet[1970]: E0516 00:52:50.819495 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.819701 kubelet[1970]: E0516 00:52:50.819681 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.819701 kubelet[1970]: W0516 00:52:50.819694 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.819803 kubelet[1970]: E0516 00:52:50.819704 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.819961 kubelet[1970]: E0516 00:52:50.819948 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.819961 kubelet[1970]: W0516 00:52:50.819961 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.820044 kubelet[1970]: E0516 00:52:50.819972 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.827886 env[1219]: time="2025-05-16T00:52:50.827771425Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wl4kg,Uid:4bbfa556-6164-4ec5-911a-15817867e1ea,Namespace:calico-system,Attempt:0,} returns sandbox id \"f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72\"" May 16 00:52:50.918754 kubelet[1970]: E0516 00:52:50.918629 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.918754 kubelet[1970]: W0516 00:52:50.918650 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.918754 kubelet[1970]: E0516 00:52:50.918670 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.918932 kubelet[1970]: E0516 00:52:50.918923 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.918932 kubelet[1970]: W0516 00:52:50.918931 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.918982 kubelet[1970]: E0516 00:52:50.918940 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.919244 kubelet[1970]: E0516 00:52:50.919209 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.919244 kubelet[1970]: W0516 00:52:50.919233 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.919311 kubelet[1970]: E0516 00:52:50.919248 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.919458 kubelet[1970]: E0516 00:52:50.919446 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.919458 kubelet[1970]: W0516 00:52:50.919457 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.919517 kubelet[1970]: E0516 00:52:50.919467 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.919617 kubelet[1970]: E0516 00:52:50.919605 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.919617 kubelet[1970]: W0516 00:52:50.919615 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.919666 kubelet[1970]: E0516 00:52:50.919623 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.919817 kubelet[1970]: E0516 00:52:50.919804 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.919817 kubelet[1970]: W0516 00:52:50.919816 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.919881 kubelet[1970]: E0516 00:52:50.919825 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.920327 kubelet[1970]: E0516 00:52:50.920292 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.920327 kubelet[1970]: W0516 00:52:50.920313 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.920391 kubelet[1970]: E0516 00:52:50.920329 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.920553 kubelet[1970]: E0516 00:52:50.920537 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.920581 kubelet[1970]: W0516 00:52:50.920552 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.920581 kubelet[1970]: E0516 00:52:50.920562 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.920798 kubelet[1970]: E0516 00:52:50.920783 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.920845 kubelet[1970]: W0516 00:52:50.920799 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.920845 kubelet[1970]: E0516 00:52:50.920816 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.921018 kubelet[1970]: E0516 00:52:50.921002 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.921018 kubelet[1970]: W0516 00:52:50.921015 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.921070 kubelet[1970]: E0516 00:52:50.921025 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.921629 kubelet[1970]: E0516 00:52:50.921598 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.921629 kubelet[1970]: W0516 00:52:50.921615 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.921629 kubelet[1970]: E0516 00:52:50.921627 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.921887 kubelet[1970]: E0516 00:52:50.921865 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.921887 kubelet[1970]: W0516 00:52:50.921882 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.921969 kubelet[1970]: E0516 00:52:50.921894 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.922071 kubelet[1970]: E0516 00:52:50.922054 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.922071 kubelet[1970]: W0516 00:52:50.922070 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.922140 kubelet[1970]: E0516 00:52:50.922086 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.922314 kubelet[1970]: E0516 00:52:50.922294 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.922314 kubelet[1970]: W0516 00:52:50.922306 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.922388 kubelet[1970]: E0516 00:52:50.922321 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.922624 kubelet[1970]: E0516 00:52:50.922593 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.922624 kubelet[1970]: W0516 00:52:50.922612 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.922624 kubelet[1970]: E0516 00:52:50.922625 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.922877 kubelet[1970]: E0516 00:52:50.922863 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.922906 kubelet[1970]: W0516 00:52:50.922878 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.922906 kubelet[1970]: E0516 00:52:50.922887 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.923248 kubelet[1970]: E0516 00:52:50.923227 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.923248 kubelet[1970]: W0516 00:52:50.923248 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.923320 kubelet[1970]: E0516 00:52:50.923260 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.923496 kubelet[1970]: E0516 00:52:50.923479 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.923531 kubelet[1970]: W0516 00:52:50.923496 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.923531 kubelet[1970]: E0516 00:52:50.923514 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.924338 kubelet[1970]: E0516 00:52:50.924304 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.924338 kubelet[1970]: W0516 00:52:50.924324 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.924338 kubelet[1970]: E0516 00:52:50.924338 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.924981 kubelet[1970]: E0516 00:52:50.924963 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.924981 kubelet[1970]: W0516 00:52:50.924980 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.925056 kubelet[1970]: E0516 00:52:50.924993 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.925210 kubelet[1970]: E0516 00:52:50.925192 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.925210 kubelet[1970]: W0516 00:52:50.925207 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.925258 kubelet[1970]: E0516 00:52:50.925217 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.925396 kubelet[1970]: E0516 00:52:50.925382 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.925396 kubelet[1970]: W0516 00:52:50.925395 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.925452 kubelet[1970]: E0516 00:52:50.925405 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.925743 kubelet[1970]: E0516 00:52:50.925705 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.925782 kubelet[1970]: W0516 00:52:50.925744 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.925782 kubelet[1970]: E0516 00:52:50.925756 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.925968 kubelet[1970]: E0516 00:52:50.925952 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.925997 kubelet[1970]: W0516 00:52:50.925981 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.925997 kubelet[1970]: E0516 00:52:50.925992 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.926196 kubelet[1970]: E0516 00:52:50.926180 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.926227 kubelet[1970]: W0516 00:52:50.926195 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.926227 kubelet[1970]: E0516 00:52:50.926220 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:50.931549 kubelet[1970]: E0516 00:52:50.931519 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:50.931613 kubelet[1970]: W0516 00:52:50.931538 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:50.931613 kubelet[1970]: E0516 00:52:50.931570 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:51.301000 audit[2576]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:51.301000 audit[2576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8224 a0=3 a1=ffffc9500720 a2=0 a3=1 items=0 ppid=2082 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:51.301000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:51.310000 audit[2576]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:51.310000 audit[2576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc9500720 a2=0 a3=1 items=0 ppid=2082 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:51.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:51.741607 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount736991760.mount: Deactivated successfully. May 16 00:52:52.379031 env[1219]: time="2025-05-16T00:52:52.378968323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:52.380127 env[1219]: time="2025-05-16T00:52:52.380085473Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:52.381701 env[1219]: time="2025-05-16T00:52:52.381668373Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:52.383849 env[1219]: time="2025-05-16T00:52:52.383806828Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:05ca98cdd7b8267a0dc5550048c0a195c8d42f85d92f090a669493485d8a6beb\"" May 16 00:52:52.384369 env[1219]: time="2025-05-16T00:52:52.384332861Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:52.388601 env[1219]: time="2025-05-16T00:52:52.388469283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 16 00:52:52.401226 env[1219]: time="2025-05-16T00:52:52.401175885Z" level=info msg="CreateContainer within sandbox \"009046a1a8fc17a3f8de7ddf9c4f13f576b51c12b2cdb83cf7f9be6bbdf40c90\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 16 00:52:52.410081 env[1219]: time="2025-05-16T00:52:52.410027124Z" level=info msg="CreateContainer within sandbox \"009046a1a8fc17a3f8de7ddf9c4f13f576b51c12b2cdb83cf7f9be6bbdf40c90\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c2a8f1232a2337dea410d50589abf84be28421329695a10f13b7661749fb5b1b\"" May 16 00:52:52.411125 env[1219]: time="2025-05-16T00:52:52.411083311Z" level=info msg="StartContainer for \"c2a8f1232a2337dea410d50589abf84be28421329695a10f13b7661749fb5b1b\"" May 16 00:52:52.435630 systemd[1]: Started cri-containerd-c2a8f1232a2337dea410d50589abf84be28421329695a10f13b7661749fb5b1b.scope. May 16 00:52:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.467000 audit: BPF prog-id=123 op=LOAD May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2414 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:52.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613866313233326132333337646561343130643530353839616266 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2414 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:52.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613866313233326132333337646561343130643530353839616266 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit: BPF prog-id=124 op=LOAD May 16 00:52:52.468000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2414 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:52.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613866313233326132333337646561343130643530353839616266 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit: BPF prog-id=125 op=LOAD May 16 00:52:52.468000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2414 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:52.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613866313233326132333337646561343130643530353839616266 May 16 00:52:52.468000 audit: BPF prog-id=125 op=UNLOAD May 16 00:52:52.468000 audit: BPF prog-id=124 op=UNLOAD May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { perfmon } for pid=2586 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit[2586]: AVC avc: denied { bpf } for pid=2586 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:52.468000 audit: BPF prog-id=126 op=LOAD May 16 00:52:52.468000 audit[2586]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2414 pid=2586 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:52.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332613866313233326132333337646561343130643530353839616266 May 16 00:52:52.508798 env[1219]: time="2025-05-16T00:52:52.508690715Z" level=info msg="StartContainer for \"c2a8f1232a2337dea410d50589abf84be28421329695a10f13b7661749fb5b1b\" returns successfully" May 16 00:52:52.591172 kubelet[1970]: E0516 00:52:52.591127 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qqqzr" podUID="0fcc127d-35ef-42b4-989b-8f2570d7bd7f" May 16 00:52:52.656839 kubelet[1970]: E0516 00:52:52.656745 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:52.676938 kubelet[1970]: I0516 00:52:52.676880 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-67ffd67967-kxsrg" podStartSLOduration=1.093026671 podStartE2EDuration="2.676863497s" podCreationTimestamp="2025-05-16 00:52:50 +0000 UTC" firstStartedPulling="2025-05-16 00:52:50.803192126 +0000 UTC m=+20.309829258" lastFinishedPulling="2025-05-16 00:52:52.387028992 +0000 UTC m=+21.893666084" observedRunningTime="2025-05-16 00:52:52.676667404 +0000 UTC m=+22.183304536" watchObservedRunningTime="2025-05-16 00:52:52.676863497 +0000 UTC m=+22.183500629" May 16 00:52:52.712596 kubelet[1970]: E0516 00:52:52.712561 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.712790 kubelet[1970]: W0516 00:52:52.712772 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.712873 kubelet[1970]: E0516 00:52:52.712861 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.713123 kubelet[1970]: E0516 00:52:52.713110 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.713212 kubelet[1970]: W0516 00:52:52.713200 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.713288 kubelet[1970]: E0516 00:52:52.713260 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.713539 kubelet[1970]: E0516 00:52:52.713526 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.713635 kubelet[1970]: W0516 00:52:52.713622 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.713703 kubelet[1970]: E0516 00:52:52.713681 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.713957 kubelet[1970]: E0516 00:52:52.713945 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.714044 kubelet[1970]: W0516 00:52:52.714032 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.714119 kubelet[1970]: E0516 00:52:52.714108 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.714380 kubelet[1970]: E0516 00:52:52.714366 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.714473 kubelet[1970]: W0516 00:52:52.714460 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.714545 kubelet[1970]: E0516 00:52:52.714535 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.714790 kubelet[1970]: E0516 00:52:52.714777 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.714890 kubelet[1970]: W0516 00:52:52.714876 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.714963 kubelet[1970]: E0516 00:52:52.714951 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.715203 kubelet[1970]: E0516 00:52:52.715191 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.715301 kubelet[1970]: W0516 00:52:52.715288 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.715370 kubelet[1970]: E0516 00:52:52.715359 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.715610 kubelet[1970]: E0516 00:52:52.715597 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.715699 kubelet[1970]: W0516 00:52:52.715685 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.715788 kubelet[1970]: E0516 00:52:52.715776 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.716048 kubelet[1970]: E0516 00:52:52.716035 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.716142 kubelet[1970]: W0516 00:52:52.716129 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.716215 kubelet[1970]: E0516 00:52:52.716205 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.718851 kubelet[1970]: E0516 00:52:52.718832 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.718961 kubelet[1970]: W0516 00:52:52.718948 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.719036 kubelet[1970]: E0516 00:52:52.719025 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.719300 kubelet[1970]: E0516 00:52:52.719287 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.719393 kubelet[1970]: W0516 00:52:52.719381 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.719453 kubelet[1970]: E0516 00:52:52.719442 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.719681 kubelet[1970]: E0516 00:52:52.719669 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.719772 kubelet[1970]: W0516 00:52:52.719760 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.719839 kubelet[1970]: E0516 00:52:52.719827 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.720069 kubelet[1970]: E0516 00:52:52.720056 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.720151 kubelet[1970]: W0516 00:52:52.720139 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.720215 kubelet[1970]: E0516 00:52:52.720204 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.720437 kubelet[1970]: E0516 00:52:52.720424 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.720516 kubelet[1970]: W0516 00:52:52.720503 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.720580 kubelet[1970]: E0516 00:52:52.720569 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.720803 kubelet[1970]: E0516 00:52:52.720790 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.720895 kubelet[1970]: W0516 00:52:52.720882 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.720954 kubelet[1970]: E0516 00:52:52.720944 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.734171 kubelet[1970]: E0516 00:52:52.734146 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.734171 kubelet[1970]: W0516 00:52:52.734165 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.734325 kubelet[1970]: E0516 00:52:52.734181 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.734419 kubelet[1970]: E0516 00:52:52.734404 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.734419 kubelet[1970]: W0516 00:52:52.734418 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.734480 kubelet[1970]: E0516 00:52:52.734428 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.734810 kubelet[1970]: E0516 00:52:52.734790 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.734810 kubelet[1970]: W0516 00:52:52.734808 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.734894 kubelet[1970]: E0516 00:52:52.734820 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.735116 kubelet[1970]: E0516 00:52:52.735087 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.735116 kubelet[1970]: W0516 00:52:52.735105 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.735116 kubelet[1970]: E0516 00:52:52.735117 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.735343 kubelet[1970]: E0516 00:52:52.735323 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.735343 kubelet[1970]: W0516 00:52:52.735339 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.735460 kubelet[1970]: E0516 00:52:52.735349 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.735523 kubelet[1970]: E0516 00:52:52.735504 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.735523 kubelet[1970]: W0516 00:52:52.735522 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.735583 kubelet[1970]: E0516 00:52:52.735531 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.735687 kubelet[1970]: E0516 00:52:52.735671 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.735687 kubelet[1970]: W0516 00:52:52.735682 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.735768 kubelet[1970]: E0516 00:52:52.735690 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.735858 kubelet[1970]: E0516 00:52:52.735842 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.735858 kubelet[1970]: W0516 00:52:52.735853 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.735909 kubelet[1970]: E0516 00:52:52.735862 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.736006 kubelet[1970]: E0516 00:52:52.735989 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.736006 kubelet[1970]: W0516 00:52:52.736000 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.736063 kubelet[1970]: E0516 00:52:52.736008 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.736139 kubelet[1970]: E0516 00:52:52.736124 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.736139 kubelet[1970]: W0516 00:52:52.736134 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.736205 kubelet[1970]: E0516 00:52:52.736142 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.736364 kubelet[1970]: E0516 00:52:52.736346 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.736364 kubelet[1970]: W0516 00:52:52.736359 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.736426 kubelet[1970]: E0516 00:52:52.736368 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.736700 kubelet[1970]: E0516 00:52:52.736677 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.736700 kubelet[1970]: W0516 00:52:52.736691 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.736700 kubelet[1970]: E0516 00:52:52.736700 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.736880 kubelet[1970]: E0516 00:52:52.736862 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.736880 kubelet[1970]: W0516 00:52:52.736875 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.736944 kubelet[1970]: E0516 00:52:52.736884 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.739502 kubelet[1970]: E0516 00:52:52.739469 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.739502 kubelet[1970]: W0516 00:52:52.739491 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.739502 kubelet[1970]: E0516 00:52:52.739504 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.747077 kubelet[1970]: E0516 00:52:52.747039 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.747077 kubelet[1970]: W0516 00:52:52.747061 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.747077 kubelet[1970]: E0516 00:52:52.747077 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.747341 kubelet[1970]: E0516 00:52:52.747319 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.747341 kubelet[1970]: W0516 00:52:52.747333 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.747341 kubelet[1970]: E0516 00:52:52.747342 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.748525 kubelet[1970]: E0516 00:52:52.747533 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.748525 kubelet[1970]: W0516 00:52:52.747547 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.748525 kubelet[1970]: E0516 00:52:52.747556 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:52.748525 kubelet[1970]: E0516 00:52:52.747907 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 16 00:52:52.748525 kubelet[1970]: W0516 00:52:52.747917 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 16 00:52:52.748525 kubelet[1970]: E0516 00:52:52.747926 1970 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 16 00:52:53.248675 env[1219]: time="2025-05-16T00:52:53.248620214Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:53.250295 env[1219]: time="2025-05-16T00:52:53.250264954Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:53.251637 env[1219]: time="2025-05-16T00:52:53.251600874Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:53.252970 env[1219]: time="2025-05-16T00:52:53.252942436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:53.253457 env[1219]: time="2025-05-16T00:52:53.253427625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:080eaf4c238c85534b61055c31b109c96ce3d20075391e58988541a442c7c701\"" May 16 00:52:53.256993 env[1219]: time="2025-05-16T00:52:53.256935797Z" level=info msg="CreateContainer within sandbox \"f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 16 00:52:53.266752 env[1219]: time="2025-05-16T00:52:53.266692467Z" level=info msg="CreateContainer within sandbox \"f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c0020ee37505e0a116659b0365b02e38ca9102b46416a29ed2902d5af1a4d9c2\"" May 16 00:52:53.267105 env[1219]: time="2025-05-16T00:52:53.267075130Z" level=info msg="StartContainer for \"c0020ee37505e0a116659b0365b02e38ca9102b46416a29ed2902d5af1a4d9c2\"" May 16 00:52:53.290239 systemd[1]: Started cri-containerd-c0020ee37505e0a116659b0365b02e38ca9102b46416a29ed2902d5af1a4d9c2.scope. May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2476 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:53.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330303230656533373530356530613131363635396230333635623032 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit: BPF prog-id=127 op=LOAD May 16 00:52:53.307000 audit[2660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2476 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:53.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330303230656533373530356530613131363635396230333635623032 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.307000 audit: BPF prog-id=128 op=LOAD May 16 00:52:53.307000 audit[2660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2476 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:53.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330303230656533373530356530613131363635396230333635623032 May 16 00:52:53.308000 audit: BPF prog-id=128 op=UNLOAD May 16 00:52:53.308000 audit: BPF prog-id=127 op=UNLOAD May 16 00:52:53.308000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { perfmon } for pid=2660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit[2660]: AVC avc: denied { bpf } for pid=2660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:53.308000 audit: BPF prog-id=129 op=LOAD May 16 00:52:53.308000 audit[2660]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2476 pid=2660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:53.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330303230656533373530356530613131363635396230333635623032 May 16 00:52:53.337542 env[1219]: time="2025-05-16T00:52:53.336392639Z" level=info msg="StartContainer for \"c0020ee37505e0a116659b0365b02e38ca9102b46416a29ed2902d5af1a4d9c2\" returns successfully" May 16 00:52:53.345962 systemd[1]: cri-containerd-c0020ee37505e0a116659b0365b02e38ca9102b46416a29ed2902d5af1a4d9c2.scope: Deactivated successfully. May 16 00:52:53.349000 audit: BPF prog-id=129 op=UNLOAD May 16 00:52:53.372102 env[1219]: time="2025-05-16T00:52:53.372050715Z" level=info msg="shim disconnected" id=c0020ee37505e0a116659b0365b02e38ca9102b46416a29ed2902d5af1a4d9c2 May 16 00:52:53.372102 env[1219]: time="2025-05-16T00:52:53.372095637Z" level=warning msg="cleaning up after shim disconnected" id=c0020ee37505e0a116659b0365b02e38ca9102b46416a29ed2902d5af1a4d9c2 namespace=k8s.io May 16 00:52:53.372102 env[1219]: time="2025-05-16T00:52:53.372106878Z" level=info msg="cleaning up dead shim" May 16 00:52:53.382796 env[1219]: time="2025-05-16T00:52:53.382753722Z" level=warning msg="cleanup warnings time=\"2025-05-16T00:52:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2699 runtime=io.containerd.runc.v2\n" May 16 00:52:53.658218 kubelet[1970]: E0516 00:52:53.657828 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:53.661142 env[1219]: time="2025-05-16T00:52:53.661105386Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 16 00:52:53.701000 audit[2713]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:53.701000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffd5ec76a0 a2=0 a3=1 items=0 ppid=2082 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:53.701000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:53.709000 audit[2713]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2713 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:52:53.709000 audit[2713]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd5ec76a0 a2=0 a3=1 items=0 ppid=2082 pid=2713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:53.709000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:52:54.595139 kubelet[1970]: E0516 00:52:54.595096 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qqqzr" podUID="0fcc127d-35ef-42b4-989b-8f2570d7bd7f" May 16 00:52:54.682643 kubelet[1970]: E0516 00:52:54.682605 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:55.909542 env[1219]: time="2025-05-16T00:52:55.909489941Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:55.911507 env[1219]: time="2025-05-16T00:52:55.911475451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:55.913529 env[1219]: time="2025-05-16T00:52:55.913493483Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:55.915686 env[1219]: time="2025-05-16T00:52:55.915653523Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:52:55.916183 env[1219]: time="2025-05-16T00:52:55.916147750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:0a1b3d5412de2974bc057a3463a132f935c307bc06d5b990ad54031e1f5a351d\"" May 16 00:52:55.923973 env[1219]: time="2025-05-16T00:52:55.923933422Z" level=info msg="CreateContainer within sandbox \"f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 16 00:52:55.940171 env[1219]: time="2025-05-16T00:52:55.940121001Z" level=info msg="CreateContainer within sandbox \"f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35\"" May 16 00:52:55.941831 env[1219]: time="2025-05-16T00:52:55.941804254Z" level=info msg="StartContainer for \"55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35\"" May 16 00:52:55.958758 systemd[1]: Started cri-containerd-55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35.scope. May 16 00:52:56.018773 kernel: kauditd_printk_skb: 229 callbacks suppressed May 16 00:52:56.018882 kernel: audit: type=1400 audit(1747356776.012:1005): avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.018913 kernel: audit: type=1300 audit(1747356776.012:1005): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2476 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:56.018932 kernel: audit: type=1327 audit(1747356776.012:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663130383838363461623361333165353965373736666561366663 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2476 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:56.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663130383838363461623361333165353965373736666561366663 May 16 00:52:56.020386 kernel: audit: type=1400 audit(1747356776.012:1006): avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.023605 kernel: audit: type=1400 audit(1747356776.012:1006): avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.025481 kernel: audit: type=1400 audit(1747356776.012:1006): avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.025542 kernel: audit: type=1400 audit(1747356776.012:1006): avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.027163 kernel: audit: type=1400 audit(1747356776.012:1006): avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.028842 kernel: audit: type=1400 audit(1747356776.012:1006): avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.030495 kernel: audit: type=1400 audit(1747356776.012:1006): avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit: BPF prog-id=130 op=LOAD May 16 00:52:56.012000 audit[2727]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2476 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:56.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663130383838363461623361333165353965373736666561366663 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.012000 audit: BPF prog-id=131 op=LOAD May 16 00:52:56.012000 audit[2727]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2476 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:56.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663130383838363461623361333165353965373736666561366663 May 16 00:52:56.014000 audit: BPF prog-id=131 op=UNLOAD May 16 00:52:56.014000 audit: BPF prog-id=130 op=UNLOAD May 16 00:52:56.014000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { perfmon } for pid=2727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit[2727]: AVC avc: denied { bpf } for pid=2727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:52:56.014000 audit: BPF prog-id=132 op=LOAD May 16 00:52:56.014000 audit[2727]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2476 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:52:56.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535663130383838363461623361333165353965373736666561366663 May 16 00:52:56.034150 env[1219]: time="2025-05-16T00:52:56.034113704Z" level=info msg="StartContainer for \"55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35\" returns successfully" May 16 00:52:56.591584 kubelet[1970]: E0516 00:52:56.591536 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-qqqzr" podUID="0fcc127d-35ef-42b4-989b-8f2570d7bd7f" May 16 00:52:56.674815 env[1219]: time="2025-05-16T00:52:56.674313292Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 16 00:52:56.705280 kernel: hrtimer: interrupt took 2746907 ns May 16 00:52:56.705435 kubelet[1970]: I0516 00:52:56.704901 1970 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 16 00:52:56.704804 systemd[1]: cri-containerd-55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35.scope: Deactivated successfully. May 16 00:52:56.707000 audit: BPF prog-id=132 op=UNLOAD May 16 00:52:56.732348 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35-rootfs.mount: Deactivated successfully. May 16 00:52:56.793970 env[1219]: time="2025-05-16T00:52:56.793921185Z" level=info msg="shim disconnected" id=55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35 May 16 00:52:56.793970 env[1219]: time="2025-05-16T00:52:56.793963827Z" level=warning msg="cleaning up after shim disconnected" id=55f1088864ab3a31e59e776fea6fcf4ebd399093ac73f1586ad28f0ad6dd2f35 namespace=k8s.io May 16 00:52:56.793970 env[1219]: time="2025-05-16T00:52:56.793973427Z" level=info msg="cleaning up dead shim" May 16 00:52:56.800760 systemd[1]: Created slice kubepods-besteffort-podfebbbaef_d3b9_46a5_8f7d_6d7aed958b28.slice. May 16 00:52:56.807950 systemd[1]: Created slice kubepods-besteffort-podd817ae63_d1cd_47f0_b2eb_259413458a56.slice. May 16 00:52:56.810076 env[1219]: time="2025-05-16T00:52:56.809748908Z" level=warning msg="cleanup warnings time=\"2025-05-16T00:52:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2770 runtime=io.containerd.runc.v2\n" May 16 00:52:56.814391 systemd[1]: Created slice kubepods-besteffort-podc1af5719_afc6_4505_975b_6308449f6dc4.slice. May 16 00:52:56.821759 systemd[1]: Created slice kubepods-burstable-pod7c691cdc_45e5_4cdc_af31_184a9aa2f135.slice. May 16 00:52:56.827276 systemd[1]: Created slice kubepods-besteffort-poda4982601_db92_4c47_a127_bf922c30b131.slice. May 16 00:52:56.832422 systemd[1]: Created slice kubepods-burstable-pod656cf93b_6d43_43bb_9bf2_366b4ce24852.slice. May 16 00:52:56.834659 systemd[1]: Created slice kubepods-besteffort-pod823071d7_6c7b_4b75_a341_65ab7c7542be.slice. May 16 00:52:56.863578 kubelet[1970]: I0516 00:52:56.863454 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/823071d7-6c7b-4b75-a341-65ab7c7542be-tigera-ca-bundle\") pod \"calico-kube-controllers-544774848b-fjrtt\" (UID: \"823071d7-6c7b-4b75-a341-65ab7c7542be\") " pod="calico-system/calico-kube-controllers-544774848b-fjrtt" May 16 00:52:56.863578 kubelet[1970]: I0516 00:52:56.863506 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c2v25\" (UniqueName: \"kubernetes.io/projected/656cf93b-6d43-43bb-9bf2-366b4ce24852-kube-api-access-c2v25\") pod \"coredns-674b8bbfcf-8c9g9\" (UID: \"656cf93b-6d43-43bb-9bf2-366b4ce24852\") " pod="kube-system/coredns-674b8bbfcf-8c9g9" May 16 00:52:56.863578 kubelet[1970]: I0516 00:52:56.863526 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gjdjs\" (UniqueName: \"kubernetes.io/projected/d817ae63-d1cd-47f0-b2eb-259413458a56-kube-api-access-gjdjs\") pod \"whisker-78cc859745-8qbkv\" (UID: \"d817ae63-d1cd-47f0-b2eb-259413458a56\") " pod="calico-system/whisker-78cc859745-8qbkv" May 16 00:52:56.863578 kubelet[1970]: I0516 00:52:56.863542 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-crrpr\" (UniqueName: \"kubernetes.io/projected/a4982601-db92-4c47-a127-bf922c30b131-kube-api-access-crrpr\") pod \"calico-apiserver-65756f6c56-8m8p4\" (UID: \"a4982601-db92-4c47-a127-bf922c30b131\") " pod="calico-apiserver/calico-apiserver-65756f6c56-8m8p4" May 16 00:52:56.865142 kubelet[1970]: I0516 00:52:56.865024 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7c691cdc-45e5-4cdc-af31-184a9aa2f135-config-volume\") pod \"coredns-674b8bbfcf-fm8jh\" (UID: \"7c691cdc-45e5-4cdc-af31-184a9aa2f135\") " pod="kube-system/coredns-674b8bbfcf-fm8jh" May 16 00:52:56.865245 kubelet[1970]: I0516 00:52:56.865202 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g6t2q\" (UniqueName: \"kubernetes.io/projected/823071d7-6c7b-4b75-a341-65ab7c7542be-kube-api-access-g6t2q\") pod \"calico-kube-controllers-544774848b-fjrtt\" (UID: \"823071d7-6c7b-4b75-a341-65ab7c7542be\") " pod="calico-system/calico-kube-controllers-544774848b-fjrtt" May 16 00:52:56.865245 kubelet[1970]: I0516 00:52:56.865229 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/a4982601-db92-4c47-a127-bf922c30b131-calico-apiserver-certs\") pod \"calico-apiserver-65756f6c56-8m8p4\" (UID: \"a4982601-db92-4c47-a127-bf922c30b131\") " pod="calico-apiserver/calico-apiserver-65756f6c56-8m8p4" May 16 00:52:56.865318 kubelet[1970]: I0516 00:52:56.865245 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c1af5719-afc6-4505-975b-6308449f6dc4-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-8jmjf\" (UID: \"c1af5719-afc6-4505-975b-6308449f6dc4\") " pod="calico-system/goldmane-78d55f7ddc-8jmjf" May 16 00:52:56.865318 kubelet[1970]: I0516 00:52:56.865265 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/c1af5719-afc6-4505-975b-6308449f6dc4-config\") pod \"goldmane-78d55f7ddc-8jmjf\" (UID: \"c1af5719-afc6-4505-975b-6308449f6dc4\") " pod="calico-system/goldmane-78d55f7ddc-8jmjf" May 16 00:52:56.865318 kubelet[1970]: I0516 00:52:56.865280 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/c1af5719-afc6-4505-975b-6308449f6dc4-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-8jmjf\" (UID: \"c1af5719-afc6-4505-975b-6308449f6dc4\") " pod="calico-system/goldmane-78d55f7ddc-8jmjf" May 16 00:52:56.865318 kubelet[1970]: I0516 00:52:56.865296 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/febbbaef-d3b9-46a5-8f7d-6d7aed958b28-calico-apiserver-certs\") pod \"calico-apiserver-65756f6c56-nx9wz\" (UID: \"febbbaef-d3b9-46a5-8f7d-6d7aed958b28\") " pod="calico-apiserver/calico-apiserver-65756f6c56-nx9wz" May 16 00:52:56.865318 kubelet[1970]: I0516 00:52:56.865313 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gq6ds\" (UniqueName: \"kubernetes.io/projected/febbbaef-d3b9-46a5-8f7d-6d7aed958b28-kube-api-access-gq6ds\") pod \"calico-apiserver-65756f6c56-nx9wz\" (UID: \"febbbaef-d3b9-46a5-8f7d-6d7aed958b28\") " pod="calico-apiserver/calico-apiserver-65756f6c56-nx9wz" May 16 00:52:56.865434 kubelet[1970]: I0516 00:52:56.865333 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-backend-key-pair\") pod \"whisker-78cc859745-8qbkv\" (UID: \"d817ae63-d1cd-47f0-b2eb-259413458a56\") " pod="calico-system/whisker-78cc859745-8qbkv" May 16 00:52:56.865434 kubelet[1970]: I0516 00:52:56.865349 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x8g9s\" (UniqueName: \"kubernetes.io/projected/c1af5719-afc6-4505-975b-6308449f6dc4-kube-api-access-x8g9s\") pod \"goldmane-78d55f7ddc-8jmjf\" (UID: \"c1af5719-afc6-4505-975b-6308449f6dc4\") " pod="calico-system/goldmane-78d55f7ddc-8jmjf" May 16 00:52:56.865434 kubelet[1970]: I0516 00:52:56.865365 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-26qcs\" (UniqueName: \"kubernetes.io/projected/7c691cdc-45e5-4cdc-af31-184a9aa2f135-kube-api-access-26qcs\") pod \"coredns-674b8bbfcf-fm8jh\" (UID: \"7c691cdc-45e5-4cdc-af31-184a9aa2f135\") " pod="kube-system/coredns-674b8bbfcf-fm8jh" May 16 00:52:56.865434 kubelet[1970]: I0516 00:52:56.865385 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/656cf93b-6d43-43bb-9bf2-366b4ce24852-config-volume\") pod \"coredns-674b8bbfcf-8c9g9\" (UID: \"656cf93b-6d43-43bb-9bf2-366b4ce24852\") " pod="kube-system/coredns-674b8bbfcf-8c9g9" May 16 00:52:56.865434 kubelet[1970]: I0516 00:52:56.865399 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-ca-bundle\") pod \"whisker-78cc859745-8qbkv\" (UID: \"d817ae63-d1cd-47f0-b2eb-259413458a56\") " pod="calico-system/whisker-78cc859745-8qbkv" May 16 00:52:57.104825 env[1219]: time="2025-05-16T00:52:57.104774168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-nx9wz,Uid:febbbaef-d3b9-46a5-8f7d-6d7aed958b28,Namespace:calico-apiserver,Attempt:0,}" May 16 00:52:57.114057 env[1219]: time="2025-05-16T00:52:57.113916756Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-78cc859745-8qbkv,Uid:d817ae63-d1cd-47f0-b2eb-259413458a56,Namespace:calico-system,Attempt:0,}" May 16 00:52:57.119651 env[1219]: time="2025-05-16T00:52:57.119597647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8jmjf,Uid:c1af5719-afc6-4505-975b-6308449f6dc4,Namespace:calico-system,Attempt:0,}" May 16 00:52:57.126190 kubelet[1970]: E0516 00:52:57.126150 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:57.129026 env[1219]: time="2025-05-16T00:52:57.128978087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-fm8jh,Uid:7c691cdc-45e5-4cdc-af31-184a9aa2f135,Namespace:kube-system,Attempt:0,}" May 16 00:52:57.130399 env[1219]: time="2025-05-16T00:52:57.130364438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-8m8p4,Uid:a4982601-db92-4c47-a127-bf922c30b131,Namespace:calico-apiserver,Attempt:0,}" May 16 00:52:57.137313 kubelet[1970]: E0516 00:52:57.137281 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:52:57.138816 env[1219]: time="2025-05-16T00:52:57.138778988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544774848b-fjrtt,Uid:823071d7-6c7b-4b75-a341-65ab7c7542be,Namespace:calico-system,Attempt:0,}" May 16 00:52:57.138948 env[1219]: time="2025-05-16T00:52:57.138920635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8c9g9,Uid:656cf93b-6d43-43bb-9bf2-366b4ce24852,Namespace:kube-system,Attempt:0,}" May 16 00:52:57.394568 env[1219]: time="2025-05-16T00:52:57.394418592Z" level=error msg="Failed to destroy network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.395058 env[1219]: time="2025-05-16T00:52:57.395022023Z" level=error msg="encountered an error cleaning up failed sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.395215 env[1219]: time="2025-05-16T00:52:57.395185751Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544774848b-fjrtt,Uid:823071d7-6c7b-4b75-a341-65ab7c7542be,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.395546 kubelet[1970]: E0516 00:52:57.395498 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.395637 kubelet[1970]: E0516 00:52:57.395594 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-544774848b-fjrtt" May 16 00:52:57.395637 kubelet[1970]: E0516 00:52:57.395615 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-544774848b-fjrtt" May 16 00:52:57.395691 kubelet[1970]: E0516 00:52:57.395658 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-544774848b-fjrtt_calico-system(823071d7-6c7b-4b75-a341-65ab7c7542be)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-544774848b-fjrtt_calico-system(823071d7-6c7b-4b75-a341-65ab7c7542be)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-544774848b-fjrtt" podUID="823071d7-6c7b-4b75-a341-65ab7c7542be" May 16 00:52:57.397062 env[1219]: time="2025-05-16T00:52:57.396850397Z" level=error msg="Failed to destroy network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.397548 env[1219]: time="2025-05-16T00:52:57.397501510Z" level=error msg="encountered an error cleaning up failed sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.399850 env[1219]: time="2025-05-16T00:52:57.399791787Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-fm8jh,Uid:7c691cdc-45e5-4cdc-af31-184a9aa2f135,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.399999 kubelet[1970]: E0516 00:52:57.399963 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.400058 kubelet[1970]: E0516 00:52:57.400011 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-fm8jh" May 16 00:52:57.400058 kubelet[1970]: E0516 00:52:57.400030 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-fm8jh" May 16 00:52:57.400121 kubelet[1970]: E0516 00:52:57.400064 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-fm8jh_kube-system(7c691cdc-45e5-4cdc-af31-184a9aa2f135)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-fm8jh_kube-system(7c691cdc-45e5-4cdc-af31-184a9aa2f135)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-fm8jh" podUID="7c691cdc-45e5-4cdc-af31-184a9aa2f135" May 16 00:52:57.404382 env[1219]: time="2025-05-16T00:52:57.404314899Z" level=error msg="Failed to destroy network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.404800 env[1219]: time="2025-05-16T00:52:57.404755481Z" level=error msg="encountered an error cleaning up failed sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.404848 env[1219]: time="2025-05-16T00:52:57.404808324Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-78cc859745-8qbkv,Uid:d817ae63-d1cd-47f0-b2eb-259413458a56,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.405292 kubelet[1970]: E0516 00:52:57.405000 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.405292 kubelet[1970]: E0516 00:52:57.405042 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-78cc859745-8qbkv" May 16 00:52:57.405292 kubelet[1970]: E0516 00:52:57.405069 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-78cc859745-8qbkv" May 16 00:52:57.405441 kubelet[1970]: E0516 00:52:57.405112 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-78cc859745-8qbkv_calico-system(d817ae63-d1cd-47f0-b2eb-259413458a56)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-78cc859745-8qbkv_calico-system(d817ae63-d1cd-47f0-b2eb-259413458a56)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-78cc859745-8qbkv" podUID="d817ae63-d1cd-47f0-b2eb-259413458a56" May 16 00:52:57.406899 env[1219]: time="2025-05-16T00:52:57.406847828Z" level=error msg="Failed to destroy network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.407190 env[1219]: time="2025-05-16T00:52:57.407146443Z" level=error msg="encountered an error cleaning up failed sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.407237 env[1219]: time="2025-05-16T00:52:57.407196406Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-8m8p4,Uid:a4982601-db92-4c47-a127-bf922c30b131,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.407808 kubelet[1970]: E0516 00:52:57.407776 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.407880 kubelet[1970]: E0516 00:52:57.407833 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65756f6c56-8m8p4" May 16 00:52:57.407880 kubelet[1970]: E0516 00:52:57.407853 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65756f6c56-8m8p4" May 16 00:52:57.407953 kubelet[1970]: E0516 00:52:57.407894 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65756f6c56-8m8p4_calico-apiserver(a4982601-db92-4c47-a127-bf922c30b131)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65756f6c56-8m8p4_calico-apiserver(a4982601-db92-4c47-a127-bf922c30b131)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65756f6c56-8m8p4" podUID="a4982601-db92-4c47-a127-bf922c30b131" May 16 00:52:57.413834 env[1219]: time="2025-05-16T00:52:57.413772263Z" level=error msg="Failed to destroy network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.414138 env[1219]: time="2025-05-16T00:52:57.414097039Z" level=error msg="encountered an error cleaning up failed sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.414187 env[1219]: time="2025-05-16T00:52:57.414145762Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8c9g9,Uid:656cf93b-6d43-43bb-9bf2-366b4ce24852,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.414618 kubelet[1970]: E0516 00:52:57.414318 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.414618 kubelet[1970]: E0516 00:52:57.414360 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-8c9g9" May 16 00:52:57.414618 kubelet[1970]: E0516 00:52:57.414379 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-8c9g9" May 16 00:52:57.414772 kubelet[1970]: E0516 00:52:57.414418 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-8c9g9_kube-system(656cf93b-6d43-43bb-9bf2-366b4ce24852)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-8c9g9_kube-system(656cf93b-6d43-43bb-9bf2-366b4ce24852)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-8c9g9" podUID="656cf93b-6d43-43bb-9bf2-366b4ce24852" May 16 00:52:57.416709 env[1219]: time="2025-05-16T00:52:57.416666771Z" level=error msg="Failed to destroy network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.417068 env[1219]: time="2025-05-16T00:52:57.417022589Z" level=error msg="encountered an error cleaning up failed sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.417118 env[1219]: time="2025-05-16T00:52:57.417076712Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-nx9wz,Uid:febbbaef-d3b9-46a5-8f7d-6d7aed958b28,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.417519 kubelet[1970]: E0516 00:52:57.417241 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.417519 kubelet[1970]: E0516 00:52:57.417289 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65756f6c56-nx9wz" May 16 00:52:57.417519 kubelet[1970]: E0516 00:52:57.417306 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65756f6c56-nx9wz" May 16 00:52:57.417656 kubelet[1970]: E0516 00:52:57.417346 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65756f6c56-nx9wz_calico-apiserver(febbbaef-d3b9-46a5-8f7d-6d7aed958b28)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65756f6c56-nx9wz_calico-apiserver(febbbaef-d3b9-46a5-8f7d-6d7aed958b28)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65756f6c56-nx9wz" podUID="febbbaef-d3b9-46a5-8f7d-6d7aed958b28" May 16 00:52:57.418702 env[1219]: time="2025-05-16T00:52:57.418637952Z" level=error msg="Failed to destroy network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.418979 env[1219]: time="2025-05-16T00:52:57.418936727Z" level=error msg="encountered an error cleaning up failed sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.419032 env[1219]: time="2025-05-16T00:52:57.418991770Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8jmjf,Uid:c1af5719-afc6-4505-975b-6308449f6dc4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.419756 kubelet[1970]: E0516 00:52:57.419216 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.419756 kubelet[1970]: E0516 00:52:57.419271 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-8jmjf" May 16 00:52:57.419756 kubelet[1970]: E0516 00:52:57.419288 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-8jmjf" May 16 00:52:57.419891 kubelet[1970]: E0516 00:52:57.419326 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-8jmjf_calico-system(c1af5719-afc6-4505-975b-6308449f6dc4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-8jmjf_calico-system(c1af5719-afc6-4505-975b-6308449f6dc4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-8jmjf" podUID="c1af5719-afc6-4505-975b-6308449f6dc4" May 16 00:52:57.691770 kubelet[1970]: I0516 00:52:57.690083 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:52:57.693600 env[1219]: time="2025-05-16T00:52:57.693551062Z" level=info msg="StopPodSandbox for \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\"" May 16 00:52:57.694943 kubelet[1970]: I0516 00:52:57.694916 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:52:57.695391 env[1219]: time="2025-05-16T00:52:57.695356274Z" level=info msg="StopPodSandbox for \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\"" May 16 00:52:57.696680 kubelet[1970]: I0516 00:52:57.696257 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:52:57.697901 env[1219]: time="2025-05-16T00:52:57.697873643Z" level=info msg="StopPodSandbox for \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\"" May 16 00:52:57.698488 kubelet[1970]: I0516 00:52:57.698459 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:52:57.698913 env[1219]: time="2025-05-16T00:52:57.698888615Z" level=info msg="StopPodSandbox for \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\"" May 16 00:52:57.700168 kubelet[1970]: I0516 00:52:57.699793 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:52:57.700328 env[1219]: time="2025-05-16T00:52:57.700288807Z" level=info msg="StopPodSandbox for \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\"" May 16 00:52:57.702358 kubelet[1970]: I0516 00:52:57.701938 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:52:57.702516 env[1219]: time="2025-05-16T00:52:57.702483839Z" level=info msg="StopPodSandbox for \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\"" May 16 00:52:57.704149 kubelet[1970]: I0516 00:52:57.704127 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:52:57.704744 env[1219]: time="2025-05-16T00:52:57.704675471Z" level=info msg="StopPodSandbox for \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\"" May 16 00:52:57.712687 env[1219]: time="2025-05-16T00:52:57.712645199Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 16 00:52:57.734405 env[1219]: time="2025-05-16T00:52:57.734344030Z" level=error msg="StopPodSandbox for \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\" failed" error="failed to destroy network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.734935 kubelet[1970]: E0516 00:52:57.734738 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:52:57.734935 kubelet[1970]: E0516 00:52:57.734819 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235"} May 16 00:52:57.734935 kubelet[1970]: E0516 00:52:57.734873 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c1af5719-afc6-4505-975b-6308449f6dc4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:57.734935 kubelet[1970]: E0516 00:52:57.734903 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c1af5719-afc6-4505-975b-6308449f6dc4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-8jmjf" podUID="c1af5719-afc6-4505-975b-6308449f6dc4" May 16 00:52:57.749006 env[1219]: time="2025-05-16T00:52:57.748950857Z" level=error msg="StopPodSandbox for \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\" failed" error="failed to destroy network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.749234 kubelet[1970]: E0516 00:52:57.749187 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:52:57.749302 kubelet[1970]: E0516 00:52:57.749245 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907"} May 16 00:52:57.749302 kubelet[1970]: E0516 00:52:57.749281 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d817ae63-d1cd-47f0-b2eb-259413458a56\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:57.749416 kubelet[1970]: E0516 00:52:57.749305 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d817ae63-d1cd-47f0-b2eb-259413458a56\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-78cc859745-8qbkv" podUID="d817ae63-d1cd-47f0-b2eb-259413458a56" May 16 00:52:57.761092 env[1219]: time="2025-05-16T00:52:57.761029636Z" level=error msg="StopPodSandbox for \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\" failed" error="failed to destroy network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.761530 kubelet[1970]: E0516 00:52:57.761369 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:52:57.761530 kubelet[1970]: E0516 00:52:57.761434 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b"} May 16 00:52:57.761530 kubelet[1970]: E0516 00:52:57.761468 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"823071d7-6c7b-4b75-a341-65ab7c7542be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:57.761530 kubelet[1970]: E0516 00:52:57.761499 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"823071d7-6c7b-4b75-a341-65ab7c7542be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-544774848b-fjrtt" podUID="823071d7-6c7b-4b75-a341-65ab7c7542be" May 16 00:52:57.765629 env[1219]: time="2025-05-16T00:52:57.765578828Z" level=error msg="StopPodSandbox for \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\" failed" error="failed to destroy network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.765993 kubelet[1970]: E0516 00:52:57.765871 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:52:57.765993 kubelet[1970]: E0516 00:52:57.765911 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496"} May 16 00:52:57.765993 kubelet[1970]: E0516 00:52:57.765947 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a4982601-db92-4c47-a127-bf922c30b131\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:57.765993 kubelet[1970]: E0516 00:52:57.765968 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a4982601-db92-4c47-a127-bf922c30b131\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65756f6c56-8m8p4" podUID="a4982601-db92-4c47-a127-bf922c30b131" May 16 00:52:57.767405 env[1219]: time="2025-05-16T00:52:57.767360200Z" level=error msg="StopPodSandbox for \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\" failed" error="failed to destroy network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.767587 kubelet[1970]: E0516 00:52:57.767538 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:52:57.767587 kubelet[1970]: E0516 00:52:57.767585 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496"} May 16 00:52:57.767679 kubelet[1970]: E0516 00:52:57.767613 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"febbbaef-d3b9-46a5-8f7d-6d7aed958b28\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:57.767679 kubelet[1970]: E0516 00:52:57.767631 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"febbbaef-d3b9-46a5-8f7d-6d7aed958b28\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65756f6c56-nx9wz" podUID="febbbaef-d3b9-46a5-8f7d-6d7aed958b28" May 16 00:52:57.769926 env[1219]: time="2025-05-16T00:52:57.769883809Z" level=error msg="StopPodSandbox for \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\" failed" error="failed to destroy network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.770224 kubelet[1970]: E0516 00:52:57.770101 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:52:57.770224 kubelet[1970]: E0516 00:52:57.770148 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd"} May 16 00:52:57.770224 kubelet[1970]: E0516 00:52:57.770172 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"656cf93b-6d43-43bb-9bf2-366b4ce24852\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:57.770224 kubelet[1970]: E0516 00:52:57.770200 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"656cf93b-6d43-43bb-9bf2-366b4ce24852\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-8c9g9" podUID="656cf93b-6d43-43bb-9bf2-366b4ce24852" May 16 00:52:57.781396 env[1219]: time="2025-05-16T00:52:57.781324114Z" level=error msg="StopPodSandbox for \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\" failed" error="failed to destroy network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:57.781847 kubelet[1970]: E0516 00:52:57.781762 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:52:57.781847 kubelet[1970]: E0516 00:52:57.781799 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e"} May 16 00:52:57.782029 kubelet[1970]: E0516 00:52:57.781962 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7c691cdc-45e5-4cdc-af31-184a9aa2f135\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:57.782029 kubelet[1970]: E0516 00:52:57.781990 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7c691cdc-45e5-4cdc-af31-184a9aa2f135\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-fm8jh" podUID="7c691cdc-45e5-4cdc-af31-184a9aa2f135" May 16 00:52:58.596464 systemd[1]: Created slice kubepods-besteffort-pod0fcc127d_35ef_42b4_989b_8f2570d7bd7f.slice. May 16 00:52:58.599306 env[1219]: time="2025-05-16T00:52:58.599269481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qqqzr,Uid:0fcc127d-35ef-42b4-989b-8f2570d7bd7f,Namespace:calico-system,Attempt:0,}" May 16 00:52:58.680426 env[1219]: time="2025-05-16T00:52:58.680364712Z" level=error msg="Failed to destroy network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:58.680969 env[1219]: time="2025-05-16T00:52:58.680933820Z" level=error msg="encountered an error cleaning up failed sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:58.681092 env[1219]: time="2025-05-16T00:52:58.681063547Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qqqzr,Uid:0fcc127d-35ef-42b4-989b-8f2570d7bd7f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:58.681902 kubelet[1970]: E0516 00:52:58.681858 1970 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:58.681994 kubelet[1970]: E0516 00:52:58.681929 1970 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qqqzr" May 16 00:52:58.681994 kubelet[1970]: E0516 00:52:58.681949 1970 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-qqqzr" May 16 00:52:58.682043 kubelet[1970]: E0516 00:52:58.682003 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-qqqzr_calico-system(0fcc127d-35ef-42b4-989b-8f2570d7bd7f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-qqqzr_calico-system(0fcc127d-35ef-42b4-989b-8f2570d7bd7f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qqqzr" podUID="0fcc127d-35ef-42b4-989b-8f2570d7bd7f" May 16 00:52:58.682889 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914-shm.mount: Deactivated successfully. May 16 00:52:58.712144 kubelet[1970]: I0516 00:52:58.712113 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:52:58.712941 env[1219]: time="2025-05-16T00:52:58.712888913Z" level=info msg="StopPodSandbox for \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\"" May 16 00:52:58.739833 env[1219]: time="2025-05-16T00:52:58.739754555Z" level=error msg="StopPodSandbox for \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\" failed" error="failed to destroy network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 16 00:52:58.740051 kubelet[1970]: E0516 00:52:58.740011 1970 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:52:58.740107 kubelet[1970]: E0516 00:52:58.740063 1970 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914"} May 16 00:52:58.740107 kubelet[1970]: E0516 00:52:58.740098 1970 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0fcc127d-35ef-42b4-989b-8f2570d7bd7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 16 00:52:58.740210 kubelet[1970]: E0516 00:52:58.740119 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0fcc127d-35ef-42b4-989b-8f2570d7bd7f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-qqqzr" podUID="0fcc127d-35ef-42b4-989b-8f2570d7bd7f" May 16 00:53:02.091194 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount217179423.mount: Deactivated successfully. May 16 00:53:02.402359 env[1219]: time="2025-05-16T00:53:02.402245438Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:02.404293 env[1219]: time="2025-05-16T00:53:02.404260444Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:02.405689 env[1219]: time="2025-05-16T00:53:02.405647783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:02.407225 env[1219]: time="2025-05-16T00:53:02.407201529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:02.407781 env[1219]: time="2025-05-16T00:53:02.407743872Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:f7148fde8e28b27da58f84cac134cdc53b5df321cda13c660192f06839670732\"" May 16 00:53:02.422302 env[1219]: time="2025-05-16T00:53:02.422267089Z" level=info msg="CreateContainer within sandbox \"f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 16 00:53:02.436037 env[1219]: time="2025-05-16T00:53:02.435983152Z" level=info msg="CreateContainer within sandbox \"f907f3550dfccebc205cddb3dd73823a7175d20802d78adb568053cabd469d72\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"454e39d1b94f7a97b756907dbbda0854d6c7609d18ca08e3598fc5d9e9e42ce1\"" May 16 00:53:02.436734 env[1219]: time="2025-05-16T00:53:02.436695142Z" level=info msg="StartContainer for \"454e39d1b94f7a97b756907dbbda0854d6c7609d18ca08e3598fc5d9e9e42ce1\"" May 16 00:53:02.455607 systemd[1]: Started cri-containerd-454e39d1b94f7a97b756907dbbda0854d6c7609d18ca08e3598fc5d9e9e42ce1.scope. May 16 00:53:02.503000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.507669 kernel: kauditd_printk_skb: 34 callbacks suppressed May 16 00:53:02.507746 kernel: audit: type=1400 audit(1747356782.503:1012): avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.507782 kernel: audit: type=1300 audit(1747356782.503:1012): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2476 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:02.503000 audit[3221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2476 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:02.510481 kernel: audit: type=1327 audit(1747356782.503:1012): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346533396431623934663761393762373536393037646262646130 May 16 00:53:02.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346533396431623934663761393762373536393037646262646130 May 16 00:53:02.513064 kernel: audit: type=1400 audit(1747356782.503:1013): avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.514918 kernel: audit: type=1400 audit(1747356782.503:1013): avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.517220 kernel: audit: type=1400 audit(1747356782.503:1013): avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.520344 kernel: audit: type=1400 audit(1747356782.503:1013): avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.520410 kernel: audit: type=1400 audit(1747356782.503:1013): avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.522231 kernel: audit: type=1400 audit(1747356782.503:1013): avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.524594 kernel: audit: type=1400 audit(1747356782.503:1013): avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.525141 env[1219]: time="2025-05-16T00:53:02.524545077Z" level=info msg="StartContainer for \"454e39d1b94f7a97b756907dbbda0854d6c7609d18ca08e3598fc5d9e9e42ce1\" returns successfully" May 16 00:53:02.503000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.503000 audit: BPF prog-id=133 op=LOAD May 16 00:53:02.503000 audit[3221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2476 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:02.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346533396431623934663761393762373536393037646262646130 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.504000 audit: BPF prog-id=134 op=LOAD May 16 00:53:02.504000 audit[3221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2476 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:02.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346533396431623934663761393762373536393037646262646130 May 16 00:53:02.505000 audit: BPF prog-id=134 op=UNLOAD May 16 00:53:02.505000 audit: BPF prog-id=133 op=UNLOAD May 16 00:53:02.505000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { perfmon } for pid=3221 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit[3221]: AVC avc: denied { bpf } for pid=3221 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:02.505000 audit: BPF prog-id=135 op=LOAD May 16 00:53:02.505000 audit[3221]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2476 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:02.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435346533396431623934663761393762373536393037646262646130 May 16 00:53:02.733385 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 16 00:53:02.733494 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 16 00:53:02.736149 kubelet[1970]: I0516 00:53:02.735975 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-wl4kg" podStartSLOduration=1.156594843 podStartE2EDuration="12.735960704s" podCreationTimestamp="2025-05-16 00:52:50 +0000 UTC" firstStartedPulling="2025-05-16 00:52:50.829265208 +0000 UTC m=+20.335902340" lastFinishedPulling="2025-05-16 00:53:02.408631069 +0000 UTC m=+31.915268201" observedRunningTime="2025-05-16 00:53:02.734985102 +0000 UTC m=+32.241622234" watchObservedRunningTime="2025-05-16 00:53:02.735960704 +0000 UTC m=+32.242597836" May 16 00:53:02.829353 env[1219]: time="2025-05-16T00:53:02.829310632Z" level=info msg="StopPodSandbox for \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\"" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:02.934 [INFO][3278] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:02.935 [INFO][3278] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" iface="eth0" netns="/var/run/netns/cni-7be25205-a59f-aec0-67af-e00b1e5d2307" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:02.936 [INFO][3278] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" iface="eth0" netns="/var/run/netns/cni-7be25205-a59f-aec0-67af-e00b1e5d2307" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:02.940 [INFO][3278] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" iface="eth0" netns="/var/run/netns/cni-7be25205-a59f-aec0-67af-e00b1e5d2307" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:02.941 [INFO][3278] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:02.941 [INFO][3278] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:03.077 [INFO][3288] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:03.077 [INFO][3288] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:03.077 [INFO][3288] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:03.094 [WARNING][3288] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:03.094 [INFO][3288] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:03.098 [INFO][3288] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:03.101826 env[1219]: 2025-05-16 00:53:03.100 [INFO][3278] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:03.102859 env[1219]: time="2025-05-16T00:53:03.102807674Z" level=info msg="TearDown network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\" successfully" May 16 00:53:03.102859 env[1219]: time="2025-05-16T00:53:03.102852115Z" level=info msg="StopPodSandbox for \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\" returns successfully" May 16 00:53:03.104734 systemd[1]: run-netns-cni\x2d7be25205\x2da59f\x2daec0\x2d67af\x2de00b1e5d2307.mount: Deactivated successfully. May 16 00:53:03.212673 kubelet[1970]: I0516 00:53:03.212627 1970 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-backend-key-pair\") pod \"d817ae63-d1cd-47f0-b2eb-259413458a56\" (UID: \"d817ae63-d1cd-47f0-b2eb-259413458a56\") " May 16 00:53:03.212673 kubelet[1970]: I0516 00:53:03.212673 1970 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-ca-bundle\") pod \"d817ae63-d1cd-47f0-b2eb-259413458a56\" (UID: \"d817ae63-d1cd-47f0-b2eb-259413458a56\") " May 16 00:53:03.212868 kubelet[1970]: I0516 00:53:03.212704 1970 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-gjdjs\" (UniqueName: \"kubernetes.io/projected/d817ae63-d1cd-47f0-b2eb-259413458a56-kube-api-access-gjdjs\") pod \"d817ae63-d1cd-47f0-b2eb-259413458a56\" (UID: \"d817ae63-d1cd-47f0-b2eb-259413458a56\") " May 16 00:53:03.216774 kubelet[1970]: I0516 00:53:03.216204 1970 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "d817ae63-d1cd-47f0-b2eb-259413458a56" (UID: "d817ae63-d1cd-47f0-b2eb-259413458a56"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 16 00:53:03.219687 kubelet[1970]: I0516 00:53:03.219656 1970 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "d817ae63-d1cd-47f0-b2eb-259413458a56" (UID: "d817ae63-d1cd-47f0-b2eb-259413458a56"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 16 00:53:03.220842 kubelet[1970]: I0516 00:53:03.220807 1970 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d817ae63-d1cd-47f0-b2eb-259413458a56-kube-api-access-gjdjs" (OuterVolumeSpecName: "kube-api-access-gjdjs") pod "d817ae63-d1cd-47f0-b2eb-259413458a56" (UID: "d817ae63-d1cd-47f0-b2eb-259413458a56"). InnerVolumeSpecName "kube-api-access-gjdjs". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 16 00:53:03.221473 systemd[1]: var-lib-kubelet-pods-d817ae63\x2dd1cd\x2d47f0\x2db2eb\x2d259413458a56-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dgjdjs.mount: Deactivated successfully. May 16 00:53:03.221563 systemd[1]: var-lib-kubelet-pods-d817ae63\x2dd1cd\x2d47f0\x2db2eb\x2d259413458a56-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 16 00:53:03.313345 kubelet[1970]: I0516 00:53:03.313274 1970 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 16 00:53:03.313345 kubelet[1970]: I0516 00:53:03.313304 1970 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d817ae63-d1cd-47f0-b2eb-259413458a56-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 16 00:53:03.313345 kubelet[1970]: I0516 00:53:03.313313 1970 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-gjdjs\" (UniqueName: \"kubernetes.io/projected/d817ae63-d1cd-47f0-b2eb-259413458a56-kube-api-access-gjdjs\") on node \"localhost\" DevicePath \"\"" May 16 00:53:03.723693 kubelet[1970]: I0516 00:53:03.723658 1970 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:53:03.725572 systemd[1]: Removed slice kubepods-besteffort-podd817ae63_d1cd_47f0_b2eb_259413458a56.slice. May 16 00:53:03.781871 systemd[1]: Created slice kubepods-besteffort-pod4ab3eb70_a520_44d7_b50c_85edec9d15d0.slice. May 16 00:53:03.816155 kubelet[1970]: I0516 00:53:03.816098 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/4ab3eb70-a520-44d7-b50c-85edec9d15d0-whisker-backend-key-pair\") pod \"whisker-79849f5dcc-pm8bq\" (UID: \"4ab3eb70-a520-44d7-b50c-85edec9d15d0\") " pod="calico-system/whisker-79849f5dcc-pm8bq" May 16 00:53:03.816498 kubelet[1970]: I0516 00:53:03.816162 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4ab3eb70-a520-44d7-b50c-85edec9d15d0-whisker-ca-bundle\") pod \"whisker-79849f5dcc-pm8bq\" (UID: \"4ab3eb70-a520-44d7-b50c-85edec9d15d0\") " pod="calico-system/whisker-79849f5dcc-pm8bq" May 16 00:53:03.816498 kubelet[1970]: I0516 00:53:03.816218 1970 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hhv8p\" (UniqueName: \"kubernetes.io/projected/4ab3eb70-a520-44d7-b50c-85edec9d15d0-kube-api-access-hhv8p\") pod \"whisker-79849f5dcc-pm8bq\" (UID: \"4ab3eb70-a520-44d7-b50c-85edec9d15d0\") " pod="calico-system/whisker-79849f5dcc-pm8bq" May 16 00:53:04.084694 env[1219]: time="2025-05-16T00:53:04.084566417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-79849f5dcc-pm8bq,Uid:4ab3eb70-a520-44d7-b50c-85edec9d15d0,Namespace:calico-system,Attempt:0,}" May 16 00:53:04.145000 audit[3383]: AVC avc: denied { write } for pid=3383 comm="tee" name="fd" dev="proc" ino=18163 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:53:04.145000 audit[3383]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff44897e3 a2=241 a3=1b6 items=1 ppid=3337 pid=3383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.145000 audit: CWD cwd="/etc/service/enabled/cni/log" May 16 00:53:04.145000 audit: PATH item=0 name="/dev/fd/63" inode=19790 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:53:04.145000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:53:04.147000 audit[3386]: AVC avc: denied { write } for pid=3386 comm="tee" name="fd" dev="proc" ino=18167 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:53:04.147000 audit[3386]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcda777d2 a2=241 a3=1b6 items=1 ppid=3345 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.147000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 16 00:53:04.147000 audit: PATH item=0 name="/dev/fd/63" inode=18160 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:53:04.147000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:53:04.152000 audit[3390]: AVC avc: denied { write } for pid=3390 comm="tee" name="fd" dev="proc" ino=19803 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:53:04.152000 audit[3400]: AVC avc: denied { write } for pid=3400 comm="tee" name="fd" dev="proc" ino=20608 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:53:04.152000 audit[3400]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffee0837e1 a2=241 a3=1b6 items=1 ppid=3348 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.152000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 16 00:53:04.152000 audit: PATH item=0 name="/dev/fd/63" inode=19800 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:53:04.152000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:53:04.152000 audit[3390]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe4a697e1 a2=241 a3=1b6 items=1 ppid=3334 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.152000 audit: CWD cwd="/etc/service/enabled/confd/log" May 16 00:53:04.152000 audit: PATH item=0 name="/dev/fd/63" inode=19793 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:53:04.152000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:53:04.170000 audit[3412]: AVC avc: denied { write } for pid=3412 comm="tee" name="fd" dev="proc" ino=19808 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:53:04.170000 audit[3412]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe44d57d1 a2=241 a3=1b6 items=1 ppid=3333 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.170000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 16 00:53:04.170000 audit: PATH item=0 name="/dev/fd/63" inode=20612 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:53:04.170000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:53:04.173000 audit[3420]: AVC avc: denied { write } for pid=3420 comm="tee" name="fd" dev="proc" ino=19812 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:53:04.173000 audit[3420]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe79e37e1 a2=241 a3=1b6 items=1 ppid=3340 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.173000 audit: CWD cwd="/etc/service/enabled/felix/log" May 16 00:53:04.173000 audit: PATH item=0 name="/dev/fd/63" inode=19805 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:53:04.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:53:04.179000 audit[3396]: AVC avc: denied { write } for pid=3396 comm="tee" name="fd" dev="proc" ino=19180 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 16 00:53:04.179000 audit[3396]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe09f07e2 a2=241 a3=1b6 items=1 ppid=3341 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.179000 audit: CWD cwd="/etc/service/enabled/bird/log" May 16 00:53:04.179000 audit: PATH item=0 name="/dev/fd/63" inode=18169 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 16 00:53:04.179000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 16 00:53:04.318781 systemd-networkd[1047]: cali6f9363ff4c9: Link UP May 16 00:53:04.320054 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:53:04.320118 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6f9363ff4c9: link becomes ready May 16 00:53:04.320219 systemd-networkd[1047]: cali6f9363ff4c9: Gained carrier May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.114 [INFO][3312] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.139 [INFO][3312] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--79849f5dcc--pm8bq-eth0 whisker-79849f5dcc- calico-system 4ab3eb70-a520-44d7-b50c-85edec9d15d0 952 0 2025-05-16 00:53:03 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:79849f5dcc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-79849f5dcc-pm8bq eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali6f9363ff4c9 [] [] }} ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.139 [INFO][3312] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.215 [INFO][3393] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" HandleID="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Workload="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.215 [INFO][3393] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" HandleID="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Workload="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004c510), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-79849f5dcc-pm8bq", "timestamp":"2025-05-16 00:53:04.214994281 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.215 [INFO][3393] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.215 [INFO][3393] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.215 [INFO][3393] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.226 [INFO][3393] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.240 [INFO][3393] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.261 [INFO][3393] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.265 [INFO][3393] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.269 [INFO][3393] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.269 [INFO][3393] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.271 [INFO][3393] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0 May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.295 [INFO][3393] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.301 [INFO][3393] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.302 [INFO][3393] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" host="localhost" May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.302 [INFO][3393] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:04.344557 env[1219]: 2025-05-16 00:53:04.302 [INFO][3393] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" HandleID="k8s-pod-network.85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Workload="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" May 16 00:53:04.345223 env[1219]: 2025-05-16 00:53:04.304 [INFO][3312] cni-plugin/k8s.go 418: Populated endpoint ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--79849f5dcc--pm8bq-eth0", GenerateName:"whisker-79849f5dcc-", Namespace:"calico-system", SelfLink:"", UID:"4ab3eb70-a520-44d7-b50c-85edec9d15d0", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 53, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"79849f5dcc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-79849f5dcc-pm8bq", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali6f9363ff4c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:04.345223 env[1219]: 2025-05-16 00:53:04.304 [INFO][3312] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" May 16 00:53:04.345223 env[1219]: 2025-05-16 00:53:04.304 [INFO][3312] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6f9363ff4c9 ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" May 16 00:53:04.345223 env[1219]: 2025-05-16 00:53:04.323 [INFO][3312] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" May 16 00:53:04.345223 env[1219]: 2025-05-16 00:53:04.324 [INFO][3312] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--79849f5dcc--pm8bq-eth0", GenerateName:"whisker-79849f5dcc-", Namespace:"calico-system", SelfLink:"", UID:"4ab3eb70-a520-44d7-b50c-85edec9d15d0", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 53, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"79849f5dcc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0", Pod:"whisker-79849f5dcc-pm8bq", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali6f9363ff4c9", MAC:"ee:9a:53:10:d5:fd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:04.345223 env[1219]: 2025-05-16 00:53:04.342 [INFO][3312] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0" Namespace="calico-system" Pod="whisker-79849f5dcc-pm8bq" WorkloadEndpoint="localhost-k8s-whisker--79849f5dcc--pm8bq-eth0" May 16 00:53:04.358487 env[1219]: time="2025-05-16T00:53:04.358289257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:04.358487 env[1219]: time="2025-05-16T00:53:04.358333979Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:04.358487 env[1219]: time="2025-05-16T00:53:04.358343740Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:04.358643 env[1219]: time="2025-05-16T00:53:04.358513946Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0 pid=3461 runtime=io.containerd.runc.v2 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.366000 audit: BPF prog-id=136 op=LOAD May 16 00:53:04.366000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffeb22a7b8 a2=98 a3=ffffeb22a7a8 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.366000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.366000 audit: BPF prog-id=136 op=UNLOAD May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit: BPF prog-id=137 op=LOAD May 16 00:53:04.367000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb22a448 a2=74 a3=95 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.367000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.367000 audit: BPF prog-id=137 op=UNLOAD May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.367000 audit: BPF prog-id=138 op=LOAD May 16 00:53:04.367000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb22a4a8 a2=94 a3=2 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.367000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.367000 audit: BPF prog-id=138 op=UNLOAD May 16 00:53:04.380066 systemd[1]: Started cri-containerd-85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0.scope. May 16 00:53:04.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.397000 audit: BPF prog-id=139 op=LOAD May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3461 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623131373964343637653061636638303432383431656236353533 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3461 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623131373964343637653061636638303432383431656236353533 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit: BPF prog-id=140 op=LOAD May 16 00:53:04.398000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3461 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623131373964343637653061636638303432383431656236353533 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit: BPF prog-id=141 op=LOAD May 16 00:53:04.398000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3461 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623131373964343637653061636638303432383431656236353533 May 16 00:53:04.398000 audit: BPF prog-id=141 op=UNLOAD May 16 00:53:04.398000 audit: BPF prog-id=140 op=UNLOAD May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.398000 audit: BPF prog-id=142 op=LOAD May 16 00:53:04.398000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3461 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835623131373964343637653061636638303432383431656236353533 May 16 00:53:04.399856 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:04.416078 env[1219]: time="2025-05-16T00:53:04.416041673Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-79849f5dcc-pm8bq,Uid:4ab3eb70-a520-44d7-b50c-85edec9d15d0,Namespace:calico-system,Attempt:0,} returns sandbox id \"85b1179d467e0acf8042841eb6553c14f2edb905f8dae6c1a013c070589390a0\"" May 16 00:53:04.417760 env[1219]: time="2025-05-16T00:53:04.417711099Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:53:04.462000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.462000 audit: BPF prog-id=143 op=LOAD May 16 00:53:04.462000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffeb22a468 a2=40 a3=ffffeb22a498 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.462000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.463000 audit: BPF prog-id=143 op=UNLOAD May 16 00:53:04.463000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.463000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffeb22a580 a2=50 a3=0 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.463000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb22a4d8 a2=28 a3=ffffeb22a608 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb22a508 a2=28 a3=ffffeb22a638 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb22a3b8 a2=28 a3=ffffeb22a4e8 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb22a528 a2=28 a3=ffffeb22a658 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb22a508 a2=28 a3=ffffeb22a638 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb22a4f8 a2=28 a3=ffffeb22a628 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb22a528 a2=28 a3=ffffeb22a658 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb22a508 a2=28 a3=ffffeb22a638 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb22a528 a2=28 a3=ffffeb22a658 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffeb22a4f8 a2=28 a3=ffffeb22a628 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffeb22a578 a2=28 a3=ffffeb22a6b8 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeb22a2b0 a2=50 a3=0 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit: BPF prog-id=144 op=LOAD May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffeb22a2b8 a2=94 a3=5 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit: BPF prog-id=144 op=UNLOAD May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffeb22a3c0 a2=50 a3=0 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffeb22a508 a2=4 a3=3 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.471000 audit[3489]: AVC avc: denied { confidentiality } for pid=3489 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:53:04.471000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb22a4e8 a2=94 a3=6 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.471000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { confidentiality } for pid=3489 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:53:04.472000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb229cb8 a2=94 a3=83 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.472000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.472000 audit[3489]: AVC avc: denied { confidentiality } for pid=3489 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:53:04.472000 audit[3489]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffeb229cb8 a2=94 a3=83 items=0 ppid=3343 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.472000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit: BPF prog-id=145 op=LOAD May 16 00:53:04.484000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6d9a608 a2=98 a3=ffffe6d9a5f8 items=0 ppid=3343 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.484000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:53:04.484000 audit: BPF prog-id=145 op=UNLOAD May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit: BPF prog-id=146 op=LOAD May 16 00:53:04.484000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6d9a4b8 a2=74 a3=95 items=0 ppid=3343 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.484000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:53:04.484000 audit: BPF prog-id=146 op=UNLOAD May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { perfmon } for pid=3509 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit[3509]: AVC avc: denied { bpf } for pid=3509 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.484000 audit: BPF prog-id=147 op=LOAD May 16 00:53:04.484000 audit[3509]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe6d9a4e8 a2=40 a3=ffffe6d9a518 items=0 ppid=3343 pid=3509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.484000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 16 00:53:04.484000 audit: BPF prog-id=147 op=UNLOAD May 16 00:53:04.534561 systemd-networkd[1047]: vxlan.calico: Link UP May 16 00:53:04.534570 systemd-networkd[1047]: vxlan.calico: Gained carrier May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit: BPF prog-id=148 op=LOAD May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff74177f8 a2=98 a3=fffff74177e8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit: BPF prog-id=148 op=UNLOAD May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit: BPF prog-id=149 op=LOAD May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff74174d8 a2=74 a3=95 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit: BPF prog-id=149 op=UNLOAD May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit: BPF prog-id=150 op=LOAD May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff7417538 a2=94 a3=2 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit: BPF prog-id=150 op=UNLOAD May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff7417568 a2=28 a3=fffff7417698 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7417598 a2=28 a3=fffff74176c8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7417448 a2=28 a3=fffff7417578 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff74175b8 a2=28 a3=fffff74176e8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff7417598 a2=28 a3=fffff74176c8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff7417588 a2=28 a3=fffff74176b8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff74175b8 a2=28 a3=fffff74176e8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7417598 a2=28 a3=fffff74176c8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff74175b8 a2=28 a3=fffff74176e8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffff7417588 a2=28 a3=fffff74176b8 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=fffff7417608 a2=28 a3=fffff7417748 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.551000 audit: BPF prog-id=151 op=LOAD May 16 00:53:04.551000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff7417428 a2=40 a3=fffff7417458 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.551000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.551000 audit: BPF prog-id=151 op=UNLOAD May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=fffff7417450 a2=50 a3=0 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.552000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=fffff7417450 a2=50 a3=0 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.552000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit: BPF prog-id=152 op=LOAD May 16 00:53:04.552000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff7416bb8 a2=94 a3=2 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.552000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.552000 audit: BPF prog-id=152 op=UNLOAD May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { perfmon } for pid=3534 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit[3534]: AVC avc: denied { bpf } for pid=3534 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.552000 audit: BPF prog-id=153 op=LOAD May 16 00:53:04.552000 audit[3534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffff7416d48 a2=94 a3=30 items=0 ppid=3343 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.552000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.558000 audit: BPF prog-id=154 op=LOAD May 16 00:53:04.558000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe2fe3a28 a2=98 a3=ffffe2fe3a18 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.558000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.559000 audit: BPF prog-id=154 op=UNLOAD May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit: BPF prog-id=155 op=LOAD May 16 00:53:04.559000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2fe36b8 a2=74 a3=95 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.559000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.559000 audit: BPF prog-id=155 op=UNLOAD May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.559000 audit: BPF prog-id=156 op=LOAD May 16 00:53:04.559000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2fe3718 a2=94 a3=2 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.559000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.559000 audit: BPF prog-id=156 op=UNLOAD May 16 00:53:04.592951 kubelet[1970]: I0516 00:53:04.592911 1970 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="d817ae63-d1cd-47f0-b2eb-259413458a56" path="/var/lib/kubelet/pods/d817ae63-d1cd-47f0-b2eb-259413458a56/volumes" May 16 00:53:04.596299 env[1219]: time="2025-05-16T00:53:04.596208955Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:04.597407 env[1219]: time="2025-05-16T00:53:04.597368761Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:04.597698 kubelet[1970]: E0516 00:53:04.597655 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:53:04.598333 kubelet[1970]: E0516 00:53:04.598300 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:53:04.603919 kubelet[1970]: E0516 00:53:04.603868 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:47ced77672db4c51ba427a413e787eff,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-hhv8p,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-79849f5dcc-pm8bq_calico-system(4ab3eb70-a520-44d7-b50c-85edec9d15d0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:04.608899 env[1219]: time="2025-05-16T00:53:04.607384159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:53:04.652000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.652000 audit: BPF prog-id=157 op=LOAD May 16 00:53:04.652000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2fe36d8 a2=40 a3=ffffe2fe3708 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.652000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.653000 audit: BPF prog-id=157 op=UNLOAD May 16 00:53:04.653000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.653000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe2fe37f0 a2=50 a3=0 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.653000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2fe3748 a2=28 a3=ffffe2fe3878 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2fe3778 a2=28 a3=ffffe2fe38a8 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2fe3628 a2=28 a3=ffffe2fe3758 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2fe3798 a2=28 a3=ffffe2fe38c8 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2fe3778 a2=28 a3=ffffe2fe38a8 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2fe3768 a2=28 a3=ffffe2fe3898 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2fe3798 a2=28 a3=ffffe2fe38c8 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2fe3778 a2=28 a3=ffffe2fe38a8 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2fe3798 a2=28 a3=ffffe2fe38c8 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2fe3768 a2=28 a3=ffffe2fe3898 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2fe37e8 a2=28 a3=ffffe2fe3928 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2fe3520 a2=50 a3=0 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit: BPF prog-id=158 op=LOAD May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe2fe3528 a2=94 a3=5 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit: BPF prog-id=158 op=UNLOAD May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2fe3630 a2=50 a3=0 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe2fe3778 a2=4 a3=3 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.661000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:53:04.661000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2fe3758 a2=94 a3=6 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.661000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:53:04.662000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2fe2f28 a2=94 a3=83 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.662000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { perfmon } for pid=3543 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { confidentiality } for pid=3543 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 16 00:53:04.662000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2fe2f28 a2=94 a3=83 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.662000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2fe4968 a2=10 a3=ffffe2fe4a58 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.662000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2fe4828 a2=10 a3=ffffe2fe4918 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.662000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2fe4798 a2=10 a3=ffffe2fe4918 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.662000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.662000 audit[3543]: AVC avc: denied { bpf } for pid=3543 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:04.662000 audit[3543]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2fe4798 a2=10 a3=ffffe2fe4918 items=0 ppid=3343 pid=3543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.662000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 16 00:53:04.671000 audit: BPF prog-id=153 op=UNLOAD May 16 00:53:04.718000 audit[3568]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3568 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:04.718000 audit[3568]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd66d6580 a2=0 a3=ffffb380bfa8 items=0 ppid=3343 pid=3568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.718000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:04.731000 audit[3569]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3569 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:04.731000 audit[3569]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffed6e5830 a2=0 a3=ffff91ae6fa8 items=0 ppid=3343 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.731000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:04.734000 audit[3567]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3567 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:04.734000 audit[3567]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffd04d91f0 a2=0 a3=ffff8c5f6fa8 items=0 ppid=3343 pid=3567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.734000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:04.744482 env[1219]: time="2025-05-16T00:53:04.744427967Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:04.745242 env[1219]: time="2025-05-16T00:53:04.745209398Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:04.745407 kubelet[1970]: E0516 00:53:04.745371 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:53:04.745465 kubelet[1970]: E0516 00:53:04.745415 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:53:04.745579 kubelet[1970]: E0516 00:53:04.745528 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hhv8p,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-79849f5dcc-pm8bq_calico-system(4ab3eb70-a520-44d7-b50c-85edec9d15d0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:04.747093 kubelet[1970]: E0516 00:53:04.746920 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-79849f5dcc-pm8bq" podUID="4ab3eb70-a520-44d7-b50c-85edec9d15d0" May 16 00:53:04.737000 audit[3572]: NETFILTER_CFG table=filter:104 family=2 entries=94 op=nft_register_chain pid=3572 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:04.737000 audit[3572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=53116 a0=3 a1=ffffdce4e040 a2=0 a3=ffffa6e00fa8 items=0 ppid=3343 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:04.737000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:05.574935 kubelet[1970]: I0516 00:53:05.574864 1970 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:53:05.729609 kubelet[1970]: E0516 00:53:05.729536 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-79849f5dcc-pm8bq" podUID="4ab3eb70-a520-44d7-b50c-85edec9d15d0" May 16 00:53:05.773000 audit[3629]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:05.773000 audit[3629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=ffffeb3bd5e0 a2=0 a3=1 items=0 ppid=2082 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:05.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:05.782000 audit[3629]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:05.782000 audit[3629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffeb3bd5e0 a2=0 a3=1 items=0 ppid=2082 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:05.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:05.982833 systemd-networkd[1047]: vxlan.calico: Gained IPv6LL May 16 00:53:06.238831 systemd-networkd[1047]: cali6f9363ff4c9: Gained IPv6LL May 16 00:53:07.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.134:22-10.0.0.1:50716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:07.165827 systemd[1]: Started sshd@7-10.0.0.134:22-10.0.0.1:50716.service. May 16 00:53:07.207000 audit[3636]: USER_ACCT pid=3636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:07.208927 sshd[3636]: Accepted publickey for core from 10.0.0.1 port 50716 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:07.208000 audit[3636]: CRED_ACQ pid=3636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:07.208000 audit[3636]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8717050 a2=3 a3=1 items=0 ppid=1 pid=3636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:07.208000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:07.210059 sshd[3636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:07.213360 systemd-logind[1209]: New session 8 of user core. May 16 00:53:07.214269 systemd[1]: Started session-8.scope. May 16 00:53:07.216000 audit[3636]: USER_START pid=3636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:07.218000 audit[3638]: CRED_ACQ pid=3638 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:07.387619 sshd[3636]: pam_unix(sshd:session): session closed for user core May 16 00:53:07.387000 audit[3636]: USER_END pid=3636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:07.388000 audit[3636]: CRED_DISP pid=3636 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:07.390662 systemd[1]: sshd@7-10.0.0.134:22-10.0.0.1:50716.service: Deactivated successfully. May 16 00:53:07.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.134:22-10.0.0.1:50716 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:07.391413 systemd[1]: session-8.scope: Deactivated successfully. May 16 00:53:07.391933 systemd-logind[1209]: Session 8 logged out. Waiting for processes to exit. May 16 00:53:07.392622 systemd-logind[1209]: Removed session 8. May 16 00:53:10.592285 env[1219]: time="2025-05-16T00:53:10.592237505Z" level=info msg="StopPodSandbox for \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\"" May 16 00:53:10.592628 env[1219]: time="2025-05-16T00:53:10.592281706Z" level=info msg="StopPodSandbox for \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\"" May 16 00:53:10.592628 env[1219]: time="2025-05-16T00:53:10.592237465Z" level=info msg="StopPodSandbox for \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\"" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.658 [INFO][3688] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.658 [INFO][3688] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" iface="eth0" netns="/var/run/netns/cni-398a2159-7b4e-1291-2f89-711c05b77bb2" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.659 [INFO][3688] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" iface="eth0" netns="/var/run/netns/cni-398a2159-7b4e-1291-2f89-711c05b77bb2" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.659 [INFO][3688] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" iface="eth0" netns="/var/run/netns/cni-398a2159-7b4e-1291-2f89-711c05b77bb2" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.659 [INFO][3688] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.659 [INFO][3688] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.678 [INFO][3723] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.678 [INFO][3723] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.680 [INFO][3723] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.689 [WARNING][3723] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.689 [INFO][3723] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.691 [INFO][3723] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:10.699406 env[1219]: 2025-05-16 00:53:10.697 [INFO][3688] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:10.703215 env[1219]: time="2025-05-16T00:53:10.701923280Z" level=info msg="TearDown network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\" successfully" May 16 00:53:10.703215 env[1219]: time="2025-05-16T00:53:10.701961121Z" level=info msg="StopPodSandbox for \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\" returns successfully" May 16 00:53:10.703328 kubelet[1970]: E0516 00:53:10.703039 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:10.702761 systemd[1]: run-netns-cni\x2d398a2159\x2d7b4e\x2d1291\x2d2f89\x2d711c05b77bb2.mount: Deactivated successfully. May 16 00:53:10.704814 env[1219]: time="2025-05-16T00:53:10.704007550Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8c9g9,Uid:656cf93b-6d43-43bb-9bf2-366b4ce24852,Namespace:kube-system,Attempt:1,}" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.650 [INFO][3694] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.651 [INFO][3694] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" iface="eth0" netns="/var/run/netns/cni-c4aa62d7-a9b4-e84c-662f-72f0337c59ea" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.651 [INFO][3694] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" iface="eth0" netns="/var/run/netns/cni-c4aa62d7-a9b4-e84c-662f-72f0337c59ea" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.651 [INFO][3694] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" iface="eth0" netns="/var/run/netns/cni-c4aa62d7-a9b4-e84c-662f-72f0337c59ea" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.651 [INFO][3694] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.651 [INFO][3694] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.691 [INFO][3717] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.691 [INFO][3717] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.691 [INFO][3717] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.701 [WARNING][3717] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.701 [INFO][3717] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.704 [INFO][3717] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:10.711242 env[1219]: 2025-05-16 00:53:10.707 [INFO][3694] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:10.713583 env[1219]: time="2025-05-16T00:53:10.711370235Z" level=info msg="TearDown network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\" successfully" May 16 00:53:10.713583 env[1219]: time="2025-05-16T00:53:10.711406356Z" level=info msg="StopPodSandbox for \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\" returns successfully" May 16 00:53:10.713268 systemd[1]: run-netns-cni\x2dc4aa62d7\x2da9b4\x2de84c\x2d662f\x2d72f0337c59ea.mount: Deactivated successfully. May 16 00:53:10.714511 env[1219]: time="2025-05-16T00:53:10.714484059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544774848b-fjrtt,Uid:823071d7-6c7b-4b75-a341-65ab7c7542be,Namespace:calico-system,Attempt:1,}" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.662 [INFO][3693] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.662 [INFO][3693] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" iface="eth0" netns="/var/run/netns/cni-e045b8ae-05a1-4839-941a-4d9a0dd53b47" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.662 [INFO][3693] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" iface="eth0" netns="/var/run/netns/cni-e045b8ae-05a1-4839-941a-4d9a0dd53b47" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.662 [INFO][3693] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" iface="eth0" netns="/var/run/netns/cni-e045b8ae-05a1-4839-941a-4d9a0dd53b47" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.662 [INFO][3693] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.662 [INFO][3693] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.698 [INFO][3730] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.698 [INFO][3730] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.704 [INFO][3730] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.719 [WARNING][3730] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.719 [INFO][3730] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.721 [INFO][3730] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:10.726439 env[1219]: 2025-05-16 00:53:10.724 [INFO][3693] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:10.728352 systemd[1]: run-netns-cni\x2de045b8ae\x2d05a1\x2d4839\x2d941a\x2d4d9a0dd53b47.mount: Deactivated successfully. May 16 00:53:10.732217 env[1219]: time="2025-05-16T00:53:10.729591082Z" level=info msg="TearDown network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\" successfully" May 16 00:53:10.732217 env[1219]: time="2025-05-16T00:53:10.729670645Z" level=info msg="StopPodSandbox for \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\" returns successfully" May 16 00:53:10.732217 env[1219]: time="2025-05-16T00:53:10.730242184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8jmjf,Uid:c1af5719-afc6-4505-975b-6308449f6dc4,Namespace:calico-system,Attempt:1,}" May 16 00:53:10.839612 systemd-networkd[1047]: cali266836e3c00: Link UP May 16 00:53:10.841734 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:53:10.841881 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali266836e3c00: link becomes ready May 16 00:53:10.841932 systemd-networkd[1047]: cali266836e3c00: Gained carrier May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.768 [INFO][3754] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0 calico-kube-controllers-544774848b- calico-system 823071d7-6c7b-4b75-a341-65ab7c7542be 1035 0 2025-05-16 00:52:50 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:544774848b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-544774848b-fjrtt eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali266836e3c00 [] [] }} ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.769 [INFO][3754] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.798 [INFO][3787] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" HandleID="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.798 [INFO][3787] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" HandleID="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000136e20), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-544774848b-fjrtt", "timestamp":"2025-05-16 00:53:10.798826869 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.799 [INFO][3787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.799 [INFO][3787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.799 [INFO][3787] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.808 [INFO][3787] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.813 [INFO][3787] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.818 [INFO][3787] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.820 [INFO][3787] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.822 [INFO][3787] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.822 [INFO][3787] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.823 [INFO][3787] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24 May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.826 [INFO][3787] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.831 [INFO][3787] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.831 [INFO][3787] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" host="localhost" May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.831 [INFO][3787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:10.857444 env[1219]: 2025-05-16 00:53:10.831 [INFO][3787] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" HandleID="k8s-pod-network.7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.858034 env[1219]: 2025-05-16 00:53:10.833 [INFO][3754] cni-plugin/k8s.go 418: Populated endpoint ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0", GenerateName:"calico-kube-controllers-544774848b-", Namespace:"calico-system", SelfLink:"", UID:"823071d7-6c7b-4b75-a341-65ab7c7542be", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544774848b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-544774848b-fjrtt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266836e3c00", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:10.858034 env[1219]: 2025-05-16 00:53:10.833 [INFO][3754] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.858034 env[1219]: 2025-05-16 00:53:10.833 [INFO][3754] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali266836e3c00 ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.858034 env[1219]: 2025-05-16 00:53:10.842 [INFO][3754] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.858034 env[1219]: 2025-05-16 00:53:10.843 [INFO][3754] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0", GenerateName:"calico-kube-controllers-544774848b-", Namespace:"calico-system", SelfLink:"", UID:"823071d7-6c7b-4b75-a341-65ab7c7542be", ResourceVersion:"1035", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544774848b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24", Pod:"calico-kube-controllers-544774848b-fjrtt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266836e3c00", MAC:"7a:e6:ec:29:da:6d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:10.858034 env[1219]: 2025-05-16 00:53:10.854 [INFO][3754] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24" Namespace="calico-system" Pod="calico-kube-controllers-544774848b-fjrtt" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:10.866802 kernel: kauditd_printk_skb: 622 callbacks suppressed May 16 00:53:10.866900 kernel: audit: type=1325 audit(1747356790.864:1149): table=filter:107 family=2 entries=36 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:10.864000 audit[3822]: NETFILTER_CFG table=filter:107 family=2 entries=36 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:10.864000 audit[3822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19576 a0=3 a1=fffffc09cca0 a2=0 a3=ffff8f9aefa8 items=0 ppid=3343 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.870045 kernel: audit: type=1300 audit(1747356790.864:1149): arch=c00000b7 syscall=211 success=yes exit=19576 a0=3 a1=fffffc09cca0 a2=0 a3=ffff8f9aefa8 items=0 ppid=3343 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.870151 kernel: audit: type=1327 audit(1747356790.864:1149): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:10.864000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:10.874462 env[1219]: time="2025-05-16T00:53:10.874402428Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:10.874686 env[1219]: time="2025-05-16T00:53:10.874446429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:10.874686 env[1219]: time="2025-05-16T00:53:10.874457030Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:10.874686 env[1219]: time="2025-05-16T00:53:10.874595554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24 pid=3829 runtime=io.containerd.runc.v2 May 16 00:53:10.885968 systemd[1]: Started cri-containerd-7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24.scope. May 16 00:53:10.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.927878 kernel: audit: type=1400 audit(1747356790.922:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.928014 kernel: audit: type=1400 audit(1747356790.922:1151): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.928040 kernel: audit: type=1400 audit(1747356790.922:1152): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.929395 kernel: audit: type=1400 audit(1747356790.922:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.932349 kernel: audit: type=1400 audit(1747356790.922:1154): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936483 kernel: audit: type=1400 audit(1747356790.922:1155): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938606 kernel: audit: type=1400 audit(1747356790.922:1156): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.924000 audit: BPF prog-id=159 op=LOAD May 16 00:53:10.933000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3829 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643437383132333130363537386136643930623237393934306536 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3829 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643437383132333130363537386136643930623237393934306536 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.933000 audit: BPF prog-id=160 op=LOAD May 16 00:53:10.933000 audit[3839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3829 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643437383132333130363537386136643930623237393934306536 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.936000 audit: BPF prog-id=161 op=LOAD May 16 00:53:10.936000 audit[3839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3829 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643437383132333130363537386136643930623237393934306536 May 16 00:53:10.937000 audit: BPF prog-id=161 op=UNLOAD May 16 00:53:10.938000 audit: BPF prog-id=160 op=UNLOAD May 16 00:53:10.938000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { perfmon } for pid=3839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit[3839]: AVC avc: denied { bpf } for pid=3839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:10.938000 audit: BPF prog-id=162 op=LOAD May 16 00:53:10.938000 audit[3839]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3829 pid=3839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765643437383132333130363537386136643930623237393934306536 May 16 00:53:10.941012 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:10.950777 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicdf2a112592: link becomes ready May 16 00:53:10.950287 systemd-networkd[1047]: calicdf2a112592: Link UP May 16 00:53:10.950564 systemd-networkd[1047]: calicdf2a112592: Gained carrier May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.775 [INFO][3741] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0 coredns-674b8bbfcf- kube-system 656cf93b-6d43-43bb-9bf2-366b4ce24852 1036 0 2025-05-16 00:52:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-8c9g9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calicdf2a112592 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.775 [INFO][3741] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.798 [INFO][3789] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" HandleID="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.798 [INFO][3789] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" HandleID="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001b1710), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-8c9g9", "timestamp":"2025-05-16 00:53:10.798754867 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.799 [INFO][3789] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.831 [INFO][3789] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.831 [INFO][3789] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.909 [INFO][3789] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.914 [INFO][3789] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.918 [INFO][3789] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.920 [INFO][3789] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.921 [INFO][3789] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.922 [INFO][3789] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.925 [INFO][3789] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78 May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.929 [INFO][3789] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.936 [INFO][3789] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.936 [INFO][3789] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" host="localhost" May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.936 [INFO][3789] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:10.968832 env[1219]: 2025-05-16 00:53:10.936 [INFO][3789] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" HandleID="k8s-pod-network.0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.969415 env[1219]: 2025-05-16 00:53:10.947 [INFO][3741] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"656cf93b-6d43-43bb-9bf2-366b4ce24852", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-8c9g9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicdf2a112592", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:10.969415 env[1219]: 2025-05-16 00:53:10.947 [INFO][3741] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.969415 env[1219]: 2025-05-16 00:53:10.947 [INFO][3741] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicdf2a112592 ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.969415 env[1219]: 2025-05-16 00:53:10.951 [INFO][3741] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.969415 env[1219]: 2025-05-16 00:53:10.951 [INFO][3741] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"656cf93b-6d43-43bb-9bf2-366b4ce24852", ResourceVersion:"1036", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78", Pod:"coredns-674b8bbfcf-8c9g9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicdf2a112592", MAC:"9a:57:21:8f:0d:e8", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:10.969415 env[1219]: 2025-05-16 00:53:10.966 [INFO][3741] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78" Namespace="kube-system" Pod="coredns-674b8bbfcf-8c9g9" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:10.975531 env[1219]: time="2025-05-16T00:53:10.975486076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544774848b-fjrtt,Uid:823071d7-6c7b-4b75-a341-65ab7c7542be,Namespace:calico-system,Attempt:1,} returns sandbox id \"7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24\"" May 16 00:53:10.976000 audit[3872]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=3872 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:10.977300 env[1219]: time="2025-05-16T00:53:10.977249415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 16 00:53:10.976000 audit[3872]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23740 a0=3 a1=ffffed5147f0 a2=0 a3=ffff9bff2fa8 items=0 ppid=3343 pid=3872 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:10.976000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:10.986660 env[1219]: time="2025-05-16T00:53:10.986595807Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:10.986796 env[1219]: time="2025-05-16T00:53:10.986637528Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:10.986796 env[1219]: time="2025-05-16T00:53:10.986666449Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:10.986999 env[1219]: time="2025-05-16T00:53:10.986942898Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78 pid=3879 runtime=io.containerd.runc.v2 May 16 00:53:10.996772 systemd[1]: Started cri-containerd-0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78.scope. May 16 00:53:11.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.016000 audit: BPF prog-id=163 op=LOAD May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064666634633338373837616238636439346431653431363838343163 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064666634633338373837616238636439346431653431363838343163 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit: BPF prog-id=164 op=LOAD May 16 00:53:11.017000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064666634633338373837616238636439346431653431363838343163 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit: BPF prog-id=165 op=LOAD May 16 00:53:11.017000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064666634633338373837616238636439346431653431363838343163 May 16 00:53:11.017000 audit: BPF prog-id=165 op=UNLOAD May 16 00:53:11.017000 audit: BPF prog-id=164 op=UNLOAD May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { perfmon } for pid=3890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit[3890]: AVC avc: denied { bpf } for pid=3890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.017000 audit: BPF prog-id=166 op=LOAD May 16 00:53:11.017000 audit[3890]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3879 pid=3890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064666634633338373837616238636439346431653431363838343163 May 16 00:53:11.018749 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:11.040462 env[1219]: time="2025-05-16T00:53:11.040421407Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-8c9g9,Uid:656cf93b-6d43-43bb-9bf2-366b4ce24852,Namespace:kube-system,Attempt:1,} returns sandbox id \"0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78\"" May 16 00:53:11.042613 systemd-networkd[1047]: cali6c41d21b28f: Link UP May 16 00:53:11.043743 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6c41d21b28f: link becomes ready May 16 00:53:11.043844 systemd-networkd[1047]: cali6c41d21b28f: Gained carrier May 16 00:53:11.045985 kubelet[1970]: E0516 00:53:11.045950 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:11.052698 env[1219]: time="2025-05-16T00:53:11.052629323Z" level=info msg="CreateContainer within sandbox \"0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:10.777 [INFO][3766] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0 goldmane-78d55f7ddc- calico-system c1af5719-afc6-4505-975b-6308449f6dc4 1037 0 2025-05-16 00:52:50 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-78d55f7ddc-8jmjf eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali6c41d21b28f [] [] }} ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:10.777 [INFO][3766] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:10.801 [INFO][3796] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" HandleID="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:10.801 [INFO][3796] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" HandleID="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003214c0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-78d55f7ddc-8jmjf", "timestamp":"2025-05-16 00:53:10.801309112 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:10.801 [INFO][3796] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:10.936 [INFO][3796] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:10.936 [INFO][3796] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.010 [INFO][3796] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.015 [INFO][3796] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.023 [INFO][3796] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.025 [INFO][3796] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.027 [INFO][3796] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.027 [INFO][3796] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.028 [INFO][3796] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847 May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.031 [INFO][3796] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.036 [INFO][3796] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.036 [INFO][3796] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" host="localhost" May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.036 [INFO][3796] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:11.067937 env[1219]: 2025-05-16 00:53:11.036 [INFO][3796] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" HandleID="k8s-pod-network.d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:11.068563 env[1219]: 2025-05-16 00:53:11.041 [INFO][3766] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"c1af5719-afc6-4505-975b-6308449f6dc4", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-78d55f7ddc-8jmjf", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6c41d21b28f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:11.068563 env[1219]: 2025-05-16 00:53:11.041 [INFO][3766] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:11.068563 env[1219]: 2025-05-16 00:53:11.041 [INFO][3766] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6c41d21b28f ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:11.068563 env[1219]: 2025-05-16 00:53:11.045 [INFO][3766] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:11.068563 env[1219]: 2025-05-16 00:53:11.056 [INFO][3766] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"c1af5719-afc6-4505-975b-6308449f6dc4", ResourceVersion:"1037", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847", Pod:"goldmane-78d55f7ddc-8jmjf", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6c41d21b28f", MAC:"b2:66:f5:a7:29:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:11.068563 env[1219]: 2025-05-16 00:53:11.064 [INFO][3766] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847" Namespace="calico-system" Pod="goldmane-78d55f7ddc-8jmjf" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:11.074541 env[1219]: time="2025-05-16T00:53:11.074491913Z" level=info msg="CreateContainer within sandbox \"0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"5b02699ecbb85f4c61cffd9ba850bf57911e17d27dc8cf57e00dd9bcfebdb053\"" May 16 00:53:11.075576 env[1219]: time="2025-05-16T00:53:11.075550627Z" level=info msg="StartContainer for \"5b02699ecbb85f4c61cffd9ba850bf57911e17d27dc8cf57e00dd9bcfebdb053\"" May 16 00:53:11.077000 audit[3930]: NETFILTER_CFG table=filter:109 family=2 entries=58 op=nft_register_chain pid=3930 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:11.077000 audit[3930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30408 a0=3 a1=ffffeef31ff0 a2=0 a3=ffffa4d9ffa8 items=0 ppid=3343 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.077000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:11.080402 env[1219]: time="2025-05-16T00:53:11.080327342Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:11.080474 env[1219]: time="2025-05-16T00:53:11.080410385Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:11.080474 env[1219]: time="2025-05-16T00:53:11.080436946Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:11.080737 env[1219]: time="2025-05-16T00:53:11.080675714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847 pid=3932 runtime=io.containerd.runc.v2 May 16 00:53:11.091313 systemd[1]: Started cri-containerd-d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847.scope. May 16 00:53:11.094239 systemd[1]: Started cri-containerd-5b02699ecbb85f4c61cffd9ba850bf57911e17d27dc8cf57e00dd9bcfebdb053.scope. May 16 00:53:11.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit: BPF prog-id=167 op=LOAD May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3932 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663131383131306333356461303631383132623162393930383162 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3932 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663131383131306333356461303631383132623162393930383162 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit: BPF prog-id=168 op=LOAD May 16 00:53:11.135000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3932 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663131383131306333356461303631383132623162393930383162 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit: BPF prog-id=169 op=LOAD May 16 00:53:11.135000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3932 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663131383131306333356461303631383132623162393930383162 May 16 00:53:11.135000 audit: BPF prog-id=169 op=UNLOAD May 16 00:53:11.135000 audit: BPF prog-id=168 op=UNLOAD May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.135000 audit: BPF prog-id=170 op=LOAD May 16 00:53:11.135000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3932 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.135000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432663131383131306333356461303631383132623162393930383162 May 16 00:53:11.137222 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:11.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.144000 audit: BPF prog-id=171 op=LOAD May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3879 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562303236393965636262383566346336316366666439626138353062 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3879 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562303236393965636262383566346336316366666439626138353062 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit: BPF prog-id=172 op=LOAD May 16 00:53:11.145000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3879 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562303236393965636262383566346336316366666439626138353062 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit: BPF prog-id=173 op=LOAD May 16 00:53:11.145000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3879 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562303236393965636262383566346336316366666439626138353062 May 16 00:53:11.145000 audit: BPF prog-id=173 op=UNLOAD May 16 00:53:11.145000 audit: BPF prog-id=172 op=UNLOAD May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { perfmon } for pid=3947 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit[3947]: AVC avc: denied { bpf } for pid=3947 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:11.145000 audit: BPF prog-id=174 op=LOAD May 16 00:53:11.145000 audit[3947]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3879 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562303236393965636262383566346336316366666439626138353062 May 16 00:53:11.166146 env[1219]: time="2025-05-16T00:53:11.166102488Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-8jmjf,Uid:c1af5719-afc6-4505-975b-6308449f6dc4,Namespace:calico-system,Attempt:1,} returns sandbox id \"d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847\"" May 16 00:53:11.173397 env[1219]: time="2025-05-16T00:53:11.173352043Z" level=info msg="StartContainer for \"5b02699ecbb85f4c61cffd9ba850bf57911e17d27dc8cf57e00dd9bcfebdb053\" returns successfully" May 16 00:53:11.225000 audit[3967]: AVC avc: denied { getattr } for pid=3967 comm="coredns" path="cgroup:[4026532377]" dev="nsfs" ino=4026532377 scontext=system_u:system_r:svirt_lxc_net_t:s0:c480,c892 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 16 00:53:11.225000 audit[3967]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=400053e0f0 a2=40006bc038 a3=0 items=0 ppid=3879 pid=3967 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c480,c892 key=(null) May 16 00:53:11.225000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 16 00:53:11.592064 env[1219]: time="2025-05-16T00:53:11.591969158Z" level=info msg="StopPodSandbox for \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\"" May 16 00:53:11.592289 env[1219]: time="2025-05-16T00:53:11.592082922Z" level=info msg="StopPodSandbox for \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\"" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.645 [INFO][4024] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.645 [INFO][4024] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" iface="eth0" netns="/var/run/netns/cni-8de26b81-f848-4dc8-8303-34c843df3db6" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.646 [INFO][4024] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" iface="eth0" netns="/var/run/netns/cni-8de26b81-f848-4dc8-8303-34c843df3db6" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.646 [INFO][4024] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" iface="eth0" netns="/var/run/netns/cni-8de26b81-f848-4dc8-8303-34c843df3db6" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.646 [INFO][4024] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.646 [INFO][4024] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.668 [INFO][4042] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.668 [INFO][4042] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.668 [INFO][4042] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.676 [WARNING][4042] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.677 [INFO][4042] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.678 [INFO][4042] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:11.683373 env[1219]: 2025-05-16 00:53:11.680 [INFO][4024] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:11.683373 env[1219]: time="2025-05-16T00:53:11.683329245Z" level=info msg="TearDown network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\" successfully" May 16 00:53:11.683373 env[1219]: time="2025-05-16T00:53:11.683376206Z" level=info msg="StopPodSandbox for \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\" returns successfully" May 16 00:53:11.684405 env[1219]: time="2025-05-16T00:53:11.684375519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-nx9wz,Uid:febbbaef-d3b9-46a5-8f7d-6d7aed958b28,Namespace:calico-apiserver,Attempt:1,}" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.648 [INFO][4026] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.648 [INFO][4026] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" iface="eth0" netns="/var/run/netns/cni-658ae1a2-3bd7-90c8-68a0-b1b3a2a00105" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.648 [INFO][4026] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" iface="eth0" netns="/var/run/netns/cni-658ae1a2-3bd7-90c8-68a0-b1b3a2a00105" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.648 [INFO][4026] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" iface="eth0" netns="/var/run/netns/cni-658ae1a2-3bd7-90c8-68a0-b1b3a2a00105" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.648 [INFO][4026] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.648 [INFO][4026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.669 [INFO][4044] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.669 [INFO][4044] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.678 [INFO][4044] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.686 [WARNING][4044] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.686 [INFO][4044] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.688 [INFO][4044] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:11.694201 env[1219]: 2025-05-16 00:53:11.691 [INFO][4026] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:11.694711 env[1219]: time="2025-05-16T00:53:11.694682213Z" level=info msg="TearDown network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\" successfully" May 16 00:53:11.694808 env[1219]: time="2025-05-16T00:53:11.694788617Z" level=info msg="StopPodSandbox for \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\" returns successfully" May 16 00:53:11.695626 env[1219]: time="2025-05-16T00:53:11.695597643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-8m8p4,Uid:a4982601-db92-4c47-a127-bf922c30b131,Namespace:calico-apiserver,Attempt:1,}" May 16 00:53:11.707541 systemd[1]: run-netns-cni\x2d658ae1a2\x2d3bd7\x2d90c8\x2d68a0\x2db1b3a2a00105.mount: Deactivated successfully. May 16 00:53:11.707626 systemd[1]: run-netns-cni\x2d8de26b81\x2df848\x2d4dc8\x2d8303\x2d34c843df3db6.mount: Deactivated successfully. May 16 00:53:11.765151 kubelet[1970]: E0516 00:53:11.758704 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:11.787000 audit[4091]: NETFILTER_CFG table=filter:110 family=2 entries=20 op=nft_register_rule pid=4091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:11.787000 audit[4091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=7480 a0=3 a1=fffff6b0a570 a2=0 a3=1 items=0 ppid=2082 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:11.791071 kubelet[1970]: I0516 00:53:11.789455 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-8c9g9" podStartSLOduration=34.78942641 podStartE2EDuration="34.78942641s" podCreationTimestamp="2025-05-16 00:52:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:53:11.77064388 +0000 UTC m=+41.277281052" watchObservedRunningTime="2025-05-16 00:53:11.78942641 +0000 UTC m=+41.296063542" May 16 00:53:11.794000 audit[4091]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4091 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:11.794000 audit[4091]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=fffff6b0a570 a2=0 a3=1 items=0 ppid=2082 pid=4091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.794000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:11.813000 audit[4101]: NETFILTER_CFG table=filter:112 family=2 entries=17 op=nft_register_rule pid=4101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:11.813000 audit[4101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffffb5c20f0 a2=0 a3=1 items=0 ppid=2082 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:11.827000 audit[4101]: NETFILTER_CFG table=nat:113 family=2 entries=35 op=nft_register_chain pid=4101 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:11.827000 audit[4101]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffffb5c20f0 a2=0 a3=1 items=0 ppid=2082 pid=4101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:11.877202 systemd-networkd[1047]: calied94130bf8f: Link UP May 16 00:53:11.879084 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 16 00:53:11.879157 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calied94130bf8f: link becomes ready May 16 00:53:11.880051 systemd-networkd[1047]: calied94130bf8f: Gained carrier May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.765 [INFO][4070] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0 calico-apiserver-65756f6c56- calico-apiserver a4982601-db92-4c47-a127-bf922c30b131 1066 0 2025-05-16 00:52:46 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65756f6c56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-65756f6c56-8m8p4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calied94130bf8f [] [] }} ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.765 [INFO][4070] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.835 [INFO][4089] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" HandleID="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.835 [INFO][4089] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" HandleID="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000127b40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-65756f6c56-8m8p4", "timestamp":"2025-05-16 00:53:11.835219897 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.835 [INFO][4089] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.835 [INFO][4089] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.835 [INFO][4089] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.844 [INFO][4089] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.849 [INFO][4089] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.855 [INFO][4089] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.857 [INFO][4089] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.859 [INFO][4089] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.859 [INFO][4089] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.860 [INFO][4089] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989 May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.864 [INFO][4089] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.870 [INFO][4089] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.870 [INFO][4089] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" host="localhost" May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.870 [INFO][4089] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:11.894430 env[1219]: 2025-05-16 00:53:11.870 [INFO][4089] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" HandleID="k8s-pod-network.cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.895055 env[1219]: 2025-05-16 00:53:11.875 [INFO][4070] cni-plugin/k8s.go 418: Populated endpoint ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"a4982601-db92-4c47-a127-bf922c30b131", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-65756f6c56-8m8p4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calied94130bf8f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:11.895055 env[1219]: 2025-05-16 00:53:11.876 [INFO][4070] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.895055 env[1219]: 2025-05-16 00:53:11.876 [INFO][4070] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calied94130bf8f ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.895055 env[1219]: 2025-05-16 00:53:11.879 [INFO][4070] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.895055 env[1219]: 2025-05-16 00:53:11.879 [INFO][4070] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"a4982601-db92-4c47-a127-bf922c30b131", ResourceVersion:"1066", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989", Pod:"calico-apiserver-65756f6c56-8m8p4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calied94130bf8f", MAC:"ae:cd:4c:d0:fb:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:11.895055 env[1219]: 2025-05-16 00:53:11.890 [INFO][4070] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-8m8p4" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:11.904000 audit[4114]: NETFILTER_CFG table=filter:114 family=2 entries=58 op=nft_register_chain pid=4114 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:11.904000 audit[4114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30568 a0=3 a1=ffffe26ad960 a2=0 a3=ffffa7d80fa8 items=0 ppid=3343 pid=4114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:11.904000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:11.939031 env[1219]: time="2025-05-16T00:53:11.938963786Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:11.939151 env[1219]: time="2025-05-16T00:53:11.939035029Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:11.939151 env[1219]: time="2025-05-16T00:53:11.939060909Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:11.939292 env[1219]: time="2025-05-16T00:53:11.939259076Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989 pid=4122 runtime=io.containerd.runc.v2 May 16 00:53:11.960541 systemd[1]: Started cri-containerd-cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989.scope. May 16 00:53:11.994756 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calief3b2c0b1e9: link becomes ready May 16 00:53:11.998331 systemd-networkd[1047]: calief3b2c0b1e9: Link UP May 16 00:53:11.998456 systemd-networkd[1047]: calief3b2c0b1e9: Gained carrier May 16 00:53:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit: BPF prog-id=175 op=LOAD May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.773 [INFO][4058] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0 calico-apiserver-65756f6c56- calico-apiserver febbbaef-d3b9-46a5-8f7d-6d7aed958b28 1067 0 2025-05-16 00:52:46 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65756f6c56 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-65756f6c56-nx9wz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calief3b2c0b1e9 [] [] }} ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.773 [INFO][4058] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.846 [INFO][4088] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" HandleID="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.846 [INFO][4088] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" HandleID="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004ce60), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-65756f6c56-nx9wz", "timestamp":"2025-05-16 00:53:11.846024168 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.846 [INFO][4088] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.870 [INFO][4088] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.870 [INFO][4088] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.946 [INFO][4088] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.951 [INFO][4088] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.956 [INFO][4088] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.968 [INFO][4088] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.971 [INFO][4088] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.971 [INFO][4088] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.973 [INFO][4088] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.979 [INFO][4088] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.986 [INFO][4088] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.986 [INFO][4088] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" host="localhost" May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.986 [INFO][4088] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:12.013412 env[1219]: 2025-05-16 00:53:11.986 [INFO][4088] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" HandleID="k8s-pod-network.8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:12.012000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.012000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4122 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663465373165623030396230353735666433623666353262353930 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4122 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663465373165623030396230353735666433623666353262353930 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit: BPF prog-id=176 op=LOAD May 16 00:53:12.013000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4122 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663465373165623030396230353735666433623666353262353930 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit: BPF prog-id=177 op=LOAD May 16 00:53:12.013000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4122 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663465373165623030396230353735666433623666353262353930 May 16 00:53:12.013000 audit: BPF prog-id=177 op=UNLOAD May 16 00:53:12.013000 audit: BPF prog-id=176 op=UNLOAD May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.013000 audit: BPF prog-id=178 op=LOAD May 16 00:53:12.013000 audit[4132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4122 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365663465373165623030396230353735666433623666353262353930 May 16 00:53:12.015743 env[1219]: 2025-05-16 00:53:11.992 [INFO][4058] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"febbbaef-d3b9-46a5-8f7d-6d7aed958b28", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-65756f6c56-nx9wz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calief3b2c0b1e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:12.015743 env[1219]: 2025-05-16 00:53:11.992 [INFO][4058] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:12.015743 env[1219]: 2025-05-16 00:53:11.992 [INFO][4058] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calief3b2c0b1e9 ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:12.015743 env[1219]: 2025-05-16 00:53:11.995 [INFO][4058] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:12.015743 env[1219]: 2025-05-16 00:53:11.996 [INFO][4058] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"febbbaef-d3b9-46a5-8f7d-6d7aed958b28", ResourceVersion:"1067", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe", Pod:"calico-apiserver-65756f6c56-nx9wz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calief3b2c0b1e9", MAC:"ca:0c:a1:a5:77:9d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:12.015743 env[1219]: 2025-05-16 00:53:12.008 [INFO][4058] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe" Namespace="calico-apiserver" Pod="calico-apiserver-65756f6c56-nx9wz" WorkloadEndpoint="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:12.015134 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:12.020000 audit[4159]: NETFILTER_CFG table=filter:115 family=2 entries=55 op=nft_register_chain pid=4159 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:12.020000 audit[4159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28288 a0=3 a1=ffffead4fb90 a2=0 a3=ffff94e8efa8 items=0 ppid=3343 pid=4159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.020000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:12.032879 env[1219]: time="2025-05-16T00:53:12.032830329Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-8m8p4,Uid:a4982601-db92-4c47-a127-bf922c30b131,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989\"" May 16 00:53:12.040775 env[1219]: time="2025-05-16T00:53:12.040602375Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:12.040775 env[1219]: time="2025-05-16T00:53:12.040643337Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:12.040775 env[1219]: time="2025-05-16T00:53:12.040653577Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:12.040905 env[1219]: time="2025-05-16T00:53:12.040777541Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe pid=4173 runtime=io.containerd.runc.v2 May 16 00:53:12.059687 systemd[1]: Started cri-containerd-8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe.scope. May 16 00:53:12.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.094000 audit: BPF prog-id=179 op=LOAD May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4173 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373930643334383764656137333765316461646336323065633032 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4173 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373930643334383764656137333765316461646336323065633032 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit: BPF prog-id=180 op=LOAD May 16 00:53:12.095000 audit[4183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4173 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373930643334383764656137333765316461646336323065633032 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit: BPF prog-id=181 op=LOAD May 16 00:53:12.095000 audit[4183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4173 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373930643334383764656137333765316461646336323065633032 May 16 00:53:12.095000 audit: BPF prog-id=181 op=UNLOAD May 16 00:53:12.095000 audit: BPF prog-id=180 op=UNLOAD May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { perfmon } for pid=4183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit[4183]: AVC avc: denied { bpf } for pid=4183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.095000 audit: BPF prog-id=182 op=LOAD May 16 00:53:12.095000 audit[4183]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4173 pid=4183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866373930643334383764656137333765316461646336323065633032 May 16 00:53:12.097006 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:12.118733 env[1219]: time="2025-05-16T00:53:12.118673568Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65756f6c56-nx9wz,Uid:febbbaef-d3b9-46a5-8f7d-6d7aed958b28,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe\"" May 16 00:53:12.126987 systemd-networkd[1047]: cali266836e3c00: Gained IPv6LL May 16 00:53:12.392697 systemd[1]: Started sshd@8-10.0.0.134:22-10.0.0.1:50722.service. May 16 00:53:12.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.134:22-10.0.0.1:50722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:12.438000 audit[4207]: USER_ACCT pid=4207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:12.438941 sshd[4207]: Accepted publickey for core from 10.0.0.1 port 50722 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:12.441000 audit[4207]: CRED_ACQ pid=4207 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:12.441000 audit[4207]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9d27140 a2=3 a3=1 items=0 ppid=1 pid=4207 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.441000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:12.442680 sshd[4207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:12.446106 systemd-logind[1209]: New session 9 of user core. May 16 00:53:12.446963 systemd[1]: Started session-9.scope. May 16 00:53:12.449000 audit[4207]: USER_START pid=4207 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:12.450000 audit[4209]: CRED_ACQ pid=4209 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:12.592501 env[1219]: time="2025-05-16T00:53:12.591876159Z" level=info msg="StopPodSandbox for \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\"" May 16 00:53:12.592501 env[1219]: time="2025-05-16T00:53:12.592262211Z" level=info msg="StopPodSandbox for \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\"" May 16 00:53:12.631326 sshd[4207]: pam_unix(sshd:session): session closed for user core May 16 00:53:12.632000 audit[4207]: USER_END pid=4207 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:12.632000 audit[4207]: CRED_DISP pid=4207 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:12.634141 systemd[1]: sshd@8-10.0.0.134:22-10.0.0.1:50722.service: Deactivated successfully. May 16 00:53:12.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.134:22-10.0.0.1:50722 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:12.634871 systemd[1]: session-9.scope: Deactivated successfully. May 16 00:53:12.635381 systemd-logind[1209]: Session 9 logged out. Waiting for processes to exit. May 16 00:53:12.636584 systemd-logind[1209]: Removed session 9. May 16 00:53:12.639821 systemd-networkd[1047]: cali6c41d21b28f: Gained IPv6LL May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.664 [INFO][4249] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.664 [INFO][4249] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" iface="eth0" netns="/var/run/netns/cni-5d47cac0-e085-540d-ae3a-58e225317103" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.664 [INFO][4249] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" iface="eth0" netns="/var/run/netns/cni-5d47cac0-e085-540d-ae3a-58e225317103" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.664 [INFO][4249] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" iface="eth0" netns="/var/run/netns/cni-5d47cac0-e085-540d-ae3a-58e225317103" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.664 [INFO][4249] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.664 [INFO][4249] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.682 [INFO][4267] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.682 [INFO][4267] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.683 [INFO][4267] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.691 [WARNING][4267] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.691 [INFO][4267] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.693 [INFO][4267] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:12.698094 env[1219]: 2025-05-16 00:53:12.694 [INFO][4249] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:12.698876 env[1219]: time="2025-05-16T00:53:12.698840787Z" level=info msg="TearDown network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\" successfully" May 16 00:53:12.698949 env[1219]: time="2025-05-16T00:53:12.698933670Z" level=info msg="StopPodSandbox for \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\" returns successfully" May 16 00:53:12.699677 env[1219]: time="2025-05-16T00:53:12.699653013Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qqqzr,Uid:0fcc127d-35ef-42b4-989b-8f2570d7bd7f,Namespace:calico-system,Attempt:1,}" May 16 00:53:12.704844 systemd[1]: run-netns-cni\x2d5d47cac0\x2de085\x2d540d\x2dae3a\x2d58e225317103.mount: Deactivated successfully. May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.660 [INFO][4243] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.660 [INFO][4243] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" iface="eth0" netns="/var/run/netns/cni-25522465-22d6-ceaa-44b2-8fe6091447a1" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.660 [INFO][4243] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" iface="eth0" netns="/var/run/netns/cni-25522465-22d6-ceaa-44b2-8fe6091447a1" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.661 [INFO][4243] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" iface="eth0" netns="/var/run/netns/cni-25522465-22d6-ceaa-44b2-8fe6091447a1" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.661 [INFO][4243] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.661 [INFO][4243] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.692 [INFO][4261] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.692 [INFO][4261] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.693 [INFO][4261] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.704 [WARNING][4261] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.705 [INFO][4261] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.706 [INFO][4261] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:12.710749 env[1219]: 2025-05-16 00:53:12.708 [INFO][4243] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:12.711350 env[1219]: time="2025-05-16T00:53:12.711318182Z" level=info msg="TearDown network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\" successfully" May 16 00:53:12.711423 env[1219]: time="2025-05-16T00:53:12.711406905Z" level=info msg="StopPodSandbox for \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\" returns successfully" May 16 00:53:12.711790 kubelet[1970]: E0516 00:53:12.711758 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:12.713482 env[1219]: time="2025-05-16T00:53:12.713455010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-fm8jh,Uid:7c691cdc-45e5-4cdc-af31-184a9aa2f135,Namespace:kube-system,Attempt:1,}" May 16 00:53:12.715194 systemd[1]: run-netns-cni\x2d25522465\x2d22d6\x2dceaa\x2d44b2\x2d8fe6091447a1.mount: Deactivated successfully. May 16 00:53:12.765552 kubelet[1970]: E0516 00:53:12.765209 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:12.819112 env[1219]: time="2025-05-16T00:53:12.819070436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:12.820667 env[1219]: time="2025-05-16T00:53:12.820639366Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:12.823106 env[1219]: time="2025-05-16T00:53:12.823073083Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:12.824824 env[1219]: time="2025-05-16T00:53:12.824797577Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:12.825281 env[1219]: time="2025-05-16T00:53:12.825254832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:4188fe2931435deda58a0dc1767a2f6ad2bb27e47662ccec626bd07006f56373\"" May 16 00:53:12.827279 env[1219]: time="2025-05-16T00:53:12.827165292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:53:12.837287 env[1219]: time="2025-05-16T00:53:12.836949642Z" level=info msg="CreateContainer within sandbox \"7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 16 00:53:12.869966 env[1219]: time="2025-05-16T00:53:12.869910326Z" level=info msg="CreateContainer within sandbox \"7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a60d90c9edefad74c0139308823bfccb43b262f101657d377b33a933a3553778\"" May 16 00:53:12.870746 env[1219]: time="2025-05-16T00:53:12.870703791Z" level=info msg="StartContainer for \"a60d90c9edefad74c0139308823bfccb43b262f101657d377b33a933a3553778\"" May 16 00:53:12.874083 systemd-networkd[1047]: cali126869cde1d: Link UP May 16 00:53:12.880841 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali126869cde1d: link becomes ready May 16 00:53:12.880642 systemd-networkd[1047]: cali126869cde1d: Gained carrier May 16 00:53:12.894860 systemd-networkd[1047]: calicdf2a112592: Gained IPv6LL May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.774 [INFO][4278] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--qqqzr-eth0 csi-node-driver- calico-system 0fcc127d-35ef-42b4-989b-8f2570d7bd7f 1092 0 2025-05-16 00:52:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-qqqzr eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali126869cde1d [] [] }} ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.774 [INFO][4278] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.807 [INFO][4310] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" HandleID="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.807 [INFO][4310] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" HandleID="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400034f650), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-qqqzr", "timestamp":"2025-05-16 00:53:12.807336384 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.807 [INFO][4310] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.807 [INFO][4310] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.807 [INFO][4310] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.820 [INFO][4310] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.826 [INFO][4310] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.835 [INFO][4310] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.837 [INFO][4310] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.841 [INFO][4310] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.841 [INFO][4310] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.843 [INFO][4310] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.847 [INFO][4310] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.865 [INFO][4310] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.865 [INFO][4310] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" host="localhost" May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.865 [INFO][4310] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:12.912377 env[1219]: 2025-05-16 00:53:12.865 [INFO][4310] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" HandleID="k8s-pod-network.1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.912939 env[1219]: 2025-05-16 00:53:12.872 [INFO][4278] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qqqzr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0fcc127d-35ef-42b4-989b-8f2570d7bd7f", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-qqqzr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali126869cde1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:12.912939 env[1219]: 2025-05-16 00:53:12.872 [INFO][4278] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.912939 env[1219]: 2025-05-16 00:53:12.872 [INFO][4278] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali126869cde1d ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.912939 env[1219]: 2025-05-16 00:53:12.895 [INFO][4278] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.912939 env[1219]: 2025-05-16 00:53:12.895 [INFO][4278] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qqqzr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0fcc127d-35ef-42b4-989b-8f2570d7bd7f", ResourceVersion:"1092", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e", Pod:"csi-node-driver-qqqzr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali126869cde1d", MAC:"b2:b7:02:20:6d:d3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:12.912939 env[1219]: 2025-05-16 00:53:12.907 [INFO][4278] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e" Namespace="calico-system" Pod="csi-node-driver-qqqzr" WorkloadEndpoint="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:12.920952 systemd[1]: Started cri-containerd-a60d90c9edefad74c0139308823bfccb43b262f101657d377b33a933a3553778.scope. May 16 00:53:12.926000 audit[4354]: NETFILTER_CFG table=filter:116 family=2 entries=48 op=nft_register_chain pid=4354 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:12.926000 audit[4354]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23108 a0=3 a1=ffffc09f5920 a2=0 a3=ffff88e72fa8 items=0 ppid=3343 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.926000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:12.931992 env[1219]: time="2025-05-16T00:53:12.931850248Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:12.931992 env[1219]: time="2025-05-16T00:53:12.931925211Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:12.931992 env[1219]: time="2025-05-16T00:53:12.931953492Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:12.933582 env[1219]: time="2025-05-16T00:53:12.933400938Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e pid=4362 runtime=io.containerd.runc.v2 May 16 00:53:12.950468 systemd[1]: Started cri-containerd-1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e.scope. May 16 00:53:12.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.968000 audit: BPF prog-id=183 op=LOAD May 16 00:53:12.969000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3829 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306439306339656465666164373463303133393330383832336266 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3829 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306439306339656465666164373463303133393330383832336266 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.969000 audit: BPF prog-id=184 op=LOAD May 16 00:53:12.969000 audit[4336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3829 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306439306339656465666164373463303133393330383832336266 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit: BPF prog-id=185 op=LOAD May 16 00:53:12.970000 audit[4336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3829 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306439306339656465666164373463303133393330383832336266 May 16 00:53:12.970000 audit: BPF prog-id=185 op=UNLOAD May 16 00:53:12.970000 audit: BPF prog-id=184 op=UNLOAD May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { perfmon } for pid=4336 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit[4336]: AVC avc: denied { bpf } for pid=4336 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:12.970000 audit: BPF prog-id=186 op=LOAD May 16 00:53:12.970000 audit[4336]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3829 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:12.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136306439306339656465666164373463303133393330383832336266 May 16 00:53:12.986675 systemd-networkd[1047]: calie735435a353: Link UP May 16 00:53:12.988112 systemd-networkd[1047]: calie735435a353: Gained carrier May 16 00:53:12.988811 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie735435a353: link becomes ready May 16 00:53:13.004734 env[1219]: time="2025-05-16T00:53:13.004680113Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.774 [INFO][4286] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0 coredns-674b8bbfcf- kube-system 7c691cdc-45e5-4cdc-af31-184a9aa2f135 1091 0 2025-05-16 00:52:37 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-fm8jh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie735435a353 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.774 [INFO][4286] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.807 [INFO][4308] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" HandleID="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.807 [INFO][4308] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" HandleID="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001a2e20), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-fm8jh", "timestamp":"2025-05-16 00:53:12.807583192 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.807 [INFO][4308] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.869 [INFO][4308] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.870 [INFO][4308] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.922 [INFO][4308] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.940 [INFO][4308] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.953 [INFO][4308] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.957 [INFO][4308] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.961 [INFO][4308] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.961 [INFO][4308] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.963 [INFO][4308] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.968 [INFO][4308] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.980 [INFO][4308] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.980 [INFO][4308] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" host="localhost" May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.980 [INFO][4308] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:13.009540 env[1219]: 2025-05-16 00:53:12.980 [INFO][4308] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" HandleID="k8s-pod-network.68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:13.010148 env[1219]: 2025-05-16 00:53:12.982 [INFO][4286] cni-plugin/k8s.go 418: Populated endpoint ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"7c691cdc-45e5-4cdc-af31-184a9aa2f135", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-fm8jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie735435a353", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:13.010148 env[1219]: 2025-05-16 00:53:12.983 [INFO][4286] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:13.010148 env[1219]: 2025-05-16 00:53:12.983 [INFO][4286] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie735435a353 ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:13.010148 env[1219]: 2025-05-16 00:53:12.988 [INFO][4286] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:13.010148 env[1219]: 2025-05-16 00:53:12.989 [INFO][4286] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"7c691cdc-45e5-4cdc-af31-184a9aa2f135", ResourceVersion:"1091", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d", Pod:"coredns-674b8bbfcf-fm8jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie735435a353", MAC:"0e:51:9a:d0:0b:ac", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:13.010148 env[1219]: 2025-05-16 00:53:13.001 [INFO][4286] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d" Namespace="kube-system" Pod="coredns-674b8bbfcf-fm8jh" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:13.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.007000 audit: BPF prog-id=187 op=LOAD May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4362 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383664323065613531373237363961366164356231306632333332 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4362 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383664323065613531373237363961366164356231306632333332 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit: BPF prog-id=188 op=LOAD May 16 00:53:13.008000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4362 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383664323065613531373237363961366164356231306632333332 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.008000 audit: BPF prog-id=189 op=LOAD May 16 00:53:13.008000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4362 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383664323065613531373237363961366164356231306632333332 May 16 00:53:13.008000 audit: BPF prog-id=189 op=UNLOAD May 16 00:53:13.010000 audit: BPF prog-id=188 op=UNLOAD May 16 00:53:13.010000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.010000 audit: BPF prog-id=190 op=LOAD May 16 00:53:13.010000 audit[4373]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4362 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137383664323065613531373237363961366164356231306632333332 May 16 00:53:13.014855 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:13.016000 audit[4414]: NETFILTER_CFG table=filter:117 family=2 entries=36 op=nft_register_chain pid=4414 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 16 00:53:13.016000 audit[4414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19176 a0=3 a1=ffffe62afe30 a2=0 a3=ffff991dffa8 items=0 ppid=3343 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.016000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 16 00:53:13.031763 env[1219]: time="2025-05-16T00:53:13.031723349Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-qqqzr,Uid:0fcc127d-35ef-42b4-989b-8f2570d7bd7f,Namespace:calico-system,Attempt:1,} returns sandbox id \"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e\"" May 16 00:53:13.040699 env[1219]: time="2025-05-16T00:53:13.040644705Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:13.040968 env[1219]: time="2025-05-16T00:53:13.040754789Z" level=info msg="StartContainer for \"a60d90c9edefad74c0139308823bfccb43b262f101657d377b33a933a3553778\" returns successfully" May 16 00:53:13.041772 kubelet[1970]: E0516 00:53:13.041218 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:53:13.041772 kubelet[1970]: E0516 00:53:13.041266 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:53:13.041772 kubelet[1970]: E0516 00:53:13.041507 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-x8g9s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-8jmjf_calico-system(c1af5719-afc6-4505-975b-6308449f6dc4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:13.042410 env[1219]: time="2025-05-16T00:53:13.042384959Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 16 00:53:13.043286 kubelet[1970]: E0516 00:53:13.043093 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8jmjf" podUID="c1af5719-afc6-4505-975b-6308449f6dc4" May 16 00:53:13.050985 env[1219]: time="2025-05-16T00:53:13.050775778Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 16 00:53:13.050985 env[1219]: time="2025-05-16T00:53:13.050815420Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 16 00:53:13.050985 env[1219]: time="2025-05-16T00:53:13.050826060Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 16 00:53:13.051270 env[1219]: time="2025-05-16T00:53:13.051220872Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d pid=4441 runtime=io.containerd.runc.v2 May 16 00:53:13.062943 systemd[1]: Started cri-containerd-68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d.scope. May 16 00:53:13.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.096000 audit: BPF prog-id=191 op=LOAD May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4441 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638363531643166313063386435313732363837353465643130653463 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4441 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638363531643166313063386435313732363837353465643130653463 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit: BPF prog-id=192 op=LOAD May 16 00:53:13.097000 audit[4450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4441 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638363531643166313063386435313732363837353465643130653463 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit: BPF prog-id=193 op=LOAD May 16 00:53:13.097000 audit[4450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4441 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638363531643166313063386435313732363837353465643130653463 May 16 00:53:13.097000 audit: BPF prog-id=193 op=UNLOAD May 16 00:53:13.097000 audit: BPF prog-id=192 op=UNLOAD May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { perfmon } for pid=4450 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit[4450]: AVC avc: denied { bpf } for pid=4450 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.097000 audit: BPF prog-id=194 op=LOAD May 16 00:53:13.097000 audit[4450]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4441 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638363531643166313063386435313732363837353465643130653463 May 16 00:53:13.099482 systemd-resolved[1162]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 16 00:53:13.117647 env[1219]: time="2025-05-16T00:53:13.117133111Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-fm8jh,Uid:7c691cdc-45e5-4cdc-af31-184a9aa2f135,Namespace:kube-system,Attempt:1,} returns sandbox id \"68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d\"" May 16 00:53:13.118760 kubelet[1970]: E0516 00:53:13.118703 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:13.121949 env[1219]: time="2025-05-16T00:53:13.121919739Z" level=info msg="CreateContainer within sandbox \"68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 16 00:53:13.139552 env[1219]: time="2025-05-16T00:53:13.139513323Z" level=info msg="CreateContainer within sandbox \"68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"733c0129a1a50e6d1daf969ad9a51ec4bc8f518cf04a5be14a815957cb8b1559\"" May 16 00:53:13.140384 env[1219]: time="2025-05-16T00:53:13.140362430Z" level=info msg="StartContainer for \"733c0129a1a50e6d1daf969ad9a51ec4bc8f518cf04a5be14a815957cb8b1559\"" May 16 00:53:13.155886 systemd[1]: Started cri-containerd-733c0129a1a50e6d1daf969ad9a51ec4bc8f518cf04a5be14a815957cb8b1559.scope. May 16 00:53:13.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.174000 audit: BPF prog-id=195 op=LOAD May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4441 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336330313239613161353065366431646166393639616439613531 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4441 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336330313239613161353065366431646166393639616439613531 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit: BPF prog-id=196 op=LOAD May 16 00:53:13.175000 audit[4486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4441 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336330313239613161353065366431646166393639616439613531 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit: BPF prog-id=197 op=LOAD May 16 00:53:13.175000 audit[4486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4441 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336330313239613161353065366431646166393639616439613531 May 16 00:53:13.175000 audit: BPF prog-id=197 op=UNLOAD May 16 00:53:13.175000 audit: BPF prog-id=196 op=UNLOAD May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { perfmon } for pid=4486 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit[4486]: AVC avc: denied { bpf } for pid=4486 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:13.175000 audit: BPF prog-id=198 op=LOAD May 16 00:53:13.175000 audit[4486]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4441 pid=4486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733336330313239613161353065366431646166393639616439613531 May 16 00:53:13.187493 env[1219]: time="2025-05-16T00:53:13.187446966Z" level=info msg="StartContainer for \"733c0129a1a50e6d1daf969ad9a51ec4bc8f518cf04a5be14a815957cb8b1559\" returns successfully" May 16 00:53:13.199000 audit[4498]: AVC avc: denied { getattr } for pid=4498 comm="coredns" path="cgroup:[4026532432]" dev="nsfs" ino=4026532432 scontext=system_u:system_r:svirt_lxc_net_t:s0:c654,c821 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 16 00:53:13.199000 audit[4498]: SYSCALL arch=c00000b7 syscall=79 success=no exit=-13 a0=ffffffffffffff9c a1=4000056ac8 a2=40000da578 a3=0 items=0 ppid=4441 pid=4498 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c654,c821 key=(null) May 16 00:53:13.199000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 16 00:53:13.214864 systemd-networkd[1047]: calief3b2c0b1e9: Gained IPv6LL May 16 00:53:13.278874 systemd-networkd[1047]: calied94130bf8f: Gained IPv6LL May 16 00:53:13.775626 kubelet[1970]: E0516 00:53:13.774408 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:13.776202 kubelet[1970]: E0516 00:53:13.776143 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8jmjf" podUID="c1af5719-afc6-4505-975b-6308449f6dc4" May 16 00:53:13.786318 kubelet[1970]: I0516 00:53:13.785728 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-544774848b-fjrtt" podStartSLOduration=21.9359974 podStartE2EDuration="23.785698471s" podCreationTimestamp="2025-05-16 00:52:50 +0000 UTC" firstStartedPulling="2025-05-16 00:53:10.976692557 +0000 UTC m=+40.483329649" lastFinishedPulling="2025-05-16 00:53:12.826393588 +0000 UTC m=+42.333030720" observedRunningTime="2025-05-16 00:53:13.785384941 +0000 UTC m=+43.292022073" watchObservedRunningTime="2025-05-16 00:53:13.785698471 +0000 UTC m=+43.292335603" May 16 00:53:13.806710 kubelet[1970]: I0516 00:53:13.806292 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-fm8jh" podStartSLOduration=36.806276067 podStartE2EDuration="36.806276067s" podCreationTimestamp="2025-05-16 00:52:37 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-16 00:53:13.805855174 +0000 UTC m=+43.312492306" watchObservedRunningTime="2025-05-16 00:53:13.806276067 +0000 UTC m=+43.312913199" May 16 00:53:13.809351 systemd[1]: run-containerd-runc-k8s.io-a60d90c9edefad74c0139308823bfccb43b262f101657d377b33a933a3553778-runc.b4xf0b.mount: Deactivated successfully. May 16 00:53:13.820000 audit[4532]: NETFILTER_CFG table=filter:118 family=2 entries=14 op=nft_register_rule pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:13.820000 audit[4532]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffcaacd2b0 a2=0 a3=1 items=0 ppid=2082 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.820000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:13.839000 audit[4532]: NETFILTER_CFG table=nat:119 family=2 entries=56 op=nft_register_chain pid=4532 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:13.839000 audit[4532]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffcaacd2b0 a2=0 a3=1 items=0 ppid=2082 pid=4532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:13.876000 audit[4545]: NETFILTER_CFG table=filter:120 family=2 entries=14 op=nft_register_rule pid=4545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:13.876000 audit[4545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=fffff7a9f050 a2=0 a3=1 items=0 ppid=2082 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.876000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:13.882000 audit[4545]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4545 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:13.882000 audit[4545]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff7a9f050 a2=0 a3=1 items=0 ppid=2082 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:13.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:14.174916 systemd-networkd[1047]: calie735435a353: Gained IPv6LL May 16 00:53:14.776428 kubelet[1970]: E0516 00:53:14.776388 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:14.814836 systemd-networkd[1047]: cali126869cde1d: Gained IPv6LL May 16 00:53:14.922032 env[1219]: time="2025-05-16T00:53:14.921987654Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:14.923971 env[1219]: time="2025-05-16T00:53:14.923946073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:14.925950 env[1219]: time="2025-05-16T00:53:14.925915973Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:14.927430 env[1219]: time="2025-05-16T00:53:14.927407338Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:14.927917 env[1219]: time="2025-05-16T00:53:14.927892952Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 16 00:53:14.929522 env[1219]: time="2025-05-16T00:53:14.929498921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 16 00:53:14.932765 env[1219]: time="2025-05-16T00:53:14.932741059Z" level=info msg="CreateContainer within sandbox \"cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 16 00:53:14.943220 env[1219]: time="2025-05-16T00:53:14.943186575Z" level=info msg="CreateContainer within sandbox \"cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c64c9054ab73d6953fc2e240dc7a842530daa4018026fc8ce05dbb5393bfb2da\"" May 16 00:53:14.943866 env[1219]: time="2025-05-16T00:53:14.943845155Z" level=info msg="StartContainer for \"c64c9054ab73d6953fc2e240dc7a842530daa4018026fc8ce05dbb5393bfb2da\"" May 16 00:53:14.962964 systemd[1]: run-containerd-runc-k8s.io-c64c9054ab73d6953fc2e240dc7a842530daa4018026fc8ce05dbb5393bfb2da-runc.fLgShV.mount: Deactivated successfully. May 16 00:53:14.964503 systemd[1]: Started cri-containerd-c64c9054ab73d6953fc2e240dc7a842530daa4018026fc8ce05dbb5393bfb2da.scope. May 16 00:53:14.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit: BPF prog-id=199 op=LOAD May 16 00:53:14.986000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4122 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:14.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336346339303534616237336436393533666332653234306463376138 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4122 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:14.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336346339303534616237336436393533666332653234306463376138 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.986000 audit: BPF prog-id=200 op=LOAD May 16 00:53:14.986000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4122 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:14.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336346339303534616237336436393533666332653234306463376138 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit: BPF prog-id=201 op=LOAD May 16 00:53:14.987000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4122 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336346339303534616237336436393533666332653234306463376138 May 16 00:53:14.987000 audit: BPF prog-id=201 op=UNLOAD May 16 00:53:14.987000 audit: BPF prog-id=200 op=UNLOAD May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { perfmon } for pid=4559 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit[4559]: AVC avc: denied { bpf } for pid=4559 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:14.987000 audit: BPF prog-id=202 op=LOAD May 16 00:53:14.987000 audit[4559]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4122 pid=4559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:14.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336346339303534616237336436393533666332653234306463376138 May 16 00:53:15.014524 env[1219]: time="2025-05-16T00:53:15.014479441Z" level=info msg="StartContainer for \"c64c9054ab73d6953fc2e240dc7a842530daa4018026fc8ce05dbb5393bfb2da\" returns successfully" May 16 00:53:15.189190 env[1219]: time="2025-05-16T00:53:15.189088285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:15.192114 env[1219]: time="2025-05-16T00:53:15.192089054Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:15.194403 env[1219]: time="2025-05-16T00:53:15.194379442Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:15.195912 env[1219]: time="2025-05-16T00:53:15.195888406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:15.196231 env[1219]: time="2025-05-16T00:53:15.196206376Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:0d503660232383641bf9af3b7e4ef066c0e96a8ec586f123e5b56b6a196c983d\"" May 16 00:53:15.198258 env[1219]: time="2025-05-16T00:53:15.198231116Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 16 00:53:15.200644 env[1219]: time="2025-05-16T00:53:15.200617946Z" level=info msg="CreateContainer within sandbox \"8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 16 00:53:15.209409 env[1219]: time="2025-05-16T00:53:15.209376965Z" level=info msg="CreateContainer within sandbox \"8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"46fabcf504eea18705a0886ad6d57f30a139e7b835b4cd2385e0d55694acdc19\"" May 16 00:53:15.209968 env[1219]: time="2025-05-16T00:53:15.209889300Z" level=info msg="StartContainer for \"46fabcf504eea18705a0886ad6d57f30a139e7b835b4cd2385e0d55694acdc19\"" May 16 00:53:15.225340 systemd[1]: Started cri-containerd-46fabcf504eea18705a0886ad6d57f30a139e7b835b4cd2385e0d55694acdc19.scope. May 16 00:53:15.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit: BPF prog-id=203 op=LOAD May 16 00:53:15.266000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.266000 audit[4601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4173 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436666162636635303465656131383730356130383836616436643537 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4173 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436666162636635303465656131383730356130383836616436643537 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.267000 audit: BPF prog-id=204 op=LOAD May 16 00:53:15.267000 audit[4601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4173 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436666162636635303465656131383730356130383836616436643537 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit: BPF prog-id=205 op=LOAD May 16 00:53:15.268000 audit[4601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4173 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436666162636635303465656131383730356130383836616436643537 May 16 00:53:15.268000 audit: BPF prog-id=205 op=UNLOAD May 16 00:53:15.268000 audit: BPF prog-id=204 op=UNLOAD May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { perfmon } for pid=4601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit[4601]: AVC avc: denied { bpf } for pid=4601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:15.268000 audit: BPF prog-id=206 op=LOAD May 16 00:53:15.268000 audit[4601]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4173 pid=4601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436666162636635303465656131383730356130383836616436643537 May 16 00:53:15.325930 env[1219]: time="2025-05-16T00:53:15.325877091Z" level=info msg="StartContainer for \"46fabcf504eea18705a0886ad6d57f30a139e7b835b4cd2385e0d55694acdc19\" returns successfully" May 16 00:53:15.781555 kubelet[1970]: E0516 00:53:15.781521 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:15.806466 kubelet[1970]: I0516 00:53:15.806402 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65756f6c56-nx9wz" podStartSLOduration=26.728941419999998 podStartE2EDuration="29.806387542s" podCreationTimestamp="2025-05-16 00:52:46 +0000 UTC" firstStartedPulling="2025-05-16 00:53:12.119965529 +0000 UTC m=+41.626602661" lastFinishedPulling="2025-05-16 00:53:15.197411651 +0000 UTC m=+44.704048783" observedRunningTime="2025-05-16 00:53:15.794262944 +0000 UTC m=+45.300900076" watchObservedRunningTime="2025-05-16 00:53:15.806387542 +0000 UTC m=+45.313024674" May 16 00:53:15.808000 audit[4633]: NETFILTER_CFG table=filter:122 family=2 entries=14 op=nft_register_rule pid=4633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:15.808000 audit[4633]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffc5c959c0 a2=0 a3=1 items=0 ppid=2082 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:15.817000 audit[4633]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4633 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:15.817000 audit[4633]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc5c959c0 a2=0 a3=1 items=0 ppid=2082 pid=4633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.817000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:15.839000 audit[4635]: NETFILTER_CFG table=filter:124 family=2 entries=14 op=nft_register_rule pid=4635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:15.839000 audit[4635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd53ec120 a2=0 a3=1 items=0 ppid=2082 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:15.845000 audit[4635]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:15.845000 audit[4635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffd53ec120 a2=0 a3=1 items=0 ppid=2082 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:15.845000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:16.073070 env[1219]: time="2025-05-16T00:53:16.072969542Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:16.074842 env[1219]: time="2025-05-16T00:53:16.074815956Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:16.076580 env[1219]: time="2025-05-16T00:53:16.076552126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:16.078268 env[1219]: time="2025-05-16T00:53:16.078238255Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:16.078816 env[1219]: time="2025-05-16T00:53:16.078789631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:ebe7e098653491dec9f15f87d7f5d33f47b09d1d6f3ef83deeaaa6237024c045\"" May 16 00:53:16.083885 env[1219]: time="2025-05-16T00:53:16.083858298Z" level=info msg="CreateContainer within sandbox \"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 16 00:53:16.101547 env[1219]: time="2025-05-16T00:53:16.101499329Z" level=info msg="CreateContainer within sandbox \"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"2e0bfd8d24acf00ec9c89b77e2e1e94e29454604715dece733b4801109cac939\"" May 16 00:53:16.102143 env[1219]: time="2025-05-16T00:53:16.102111466Z" level=info msg="StartContainer for \"2e0bfd8d24acf00ec9c89b77e2e1e94e29454604715dece733b4801109cac939\"" May 16 00:53:16.127407 systemd[1]: Started cri-containerd-2e0bfd8d24acf00ec9c89b77e2e1e94e29454604715dece733b4801109cac939.scope. May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.151413 kernel: kauditd_printk_skb: 748 callbacks suppressed May 16 00:53:16.151493 kernel: audit: type=1400 audit(1747356796.148:1395): avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.151566 kernel: audit: type=1300 audit(1747356796.148:1395): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4362 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:16.148000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4362 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:16.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306266643864323461636630306563396338396237376532653165 May 16 00:53:16.156708 kernel: audit: type=1327 audit(1747356796.148:1395): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306266643864323461636630306563396338396237376532653165 May 16 00:53:16.156764 kernel: audit: type=1400 audit(1747356796.148:1396): avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.160316 kernel: audit: type=1400 audit(1747356796.148:1396): avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.162338 kernel: audit: type=1400 audit(1747356796.148:1396): avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.162374 kernel: audit: type=1400 audit(1747356796.148:1396): avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.166693 kernel: audit: type=1400 audit(1747356796.148:1396): avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.168738 kernel: audit: type=1400 audit(1747356796.148:1396): avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.170775 kernel: audit: type=1400 audit(1747356796.148:1396): avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit: BPF prog-id=207 op=LOAD May 16 00:53:16.148000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4362 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:16.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306266643864323461636630306563396338396237376532653165 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit: BPF prog-id=208 op=LOAD May 16 00:53:16.148000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4362 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:16.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306266643864323461636630306563396338396237376532653165 May 16 00:53:16.148000 audit: BPF prog-id=208 op=UNLOAD May 16 00:53:16.148000 audit: BPF prog-id=207 op=UNLOAD May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { perfmon } for pid=4643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit[4643]: AVC avc: denied { bpf } for pid=4643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:16.148000 audit: BPF prog-id=209 op=LOAD May 16 00:53:16.148000 audit[4643]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4362 pid=4643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:16.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265306266643864323461636630306563396338396237376532653165 May 16 00:53:16.183912 env[1219]: time="2025-05-16T00:53:16.183868314Z" level=info msg="StartContainer for \"2e0bfd8d24acf00ec9c89b77e2e1e94e29454604715dece733b4801109cac939\" returns successfully" May 16 00:53:16.185122 env[1219]: time="2025-05-16T00:53:16.185087429Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 16 00:53:16.784674 kubelet[1970]: I0516 00:53:16.784645 1970 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:53:16.859000 audit[4570]: AVC avc: denied { watch } for pid=4570 comm="apiserver" path="/calico-apiserver-certs/..2025_05_16_00_52_56.3507905781/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c331,c567 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c331,c567 tclass=file permissive=0 May 16 00:53:16.859000 audit[4570]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40009c7aa0 a2=fc6 a3=0 items=0 ppid=4122 pid=4570 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c331,c567 key=(null) May 16 00:53:16.859000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 16 00:53:16.941054 systemd[1]: run-containerd-runc-k8s.io-2e0bfd8d24acf00ec9c89b77e2e1e94e29454604715dece733b4801109cac939-runc.9CYNEc.mount: Deactivated successfully. May 16 00:53:17.151028 env[1219]: time="2025-05-16T00:53:17.150932914Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:17.152201 env[1219]: time="2025-05-16T00:53:17.152158309Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:17.153550 env[1219]: time="2025-05-16T00:53:17.153525748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:17.154784 env[1219]: time="2025-05-16T00:53:17.154753743Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 16 00:53:17.155293 env[1219]: time="2025-05-16T00:53:17.155264557Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:a5d5f2a68204ed0dbc50f8778616ee92a63c0e342d178a4620e6271484e5c8b2\"" May 16 00:53:17.159596 env[1219]: time="2025-05-16T00:53:17.159562119Z" level=info msg="CreateContainer within sandbox \"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 16 00:53:17.171760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount516809455.mount: Deactivated successfully. May 16 00:53:17.173356 env[1219]: time="2025-05-16T00:53:17.173325830Z" level=info msg="CreateContainer within sandbox \"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"849669da158ab49bbe4f9a6f4a6f16ebbe788831d11fa1c65228383c84493291\"" May 16 00:53:17.173850 env[1219]: time="2025-05-16T00:53:17.173822324Z" level=info msg="StartContainer for \"849669da158ab49bbe4f9a6f4a6f16ebbe788831d11fa1c65228383c84493291\"" May 16 00:53:17.196918 systemd[1]: Started cri-containerd-849669da158ab49bbe4f9a6f4a6f16ebbe788831d11fa1c65228383c84493291.scope. May 16 00:53:17.210000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4362 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393636396461313538616234396262653466396136663461366631 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.210000 audit: BPF prog-id=210 op=LOAD May 16 00:53:17.210000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4362 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393636396461313538616234396262653466396136663461366631 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.211000 audit: BPF prog-id=211 op=LOAD May 16 00:53:17.211000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4362 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393636396461313538616234396262653466396136663461366631 May 16 00:53:17.212000 audit: BPF prog-id=211 op=UNLOAD May 16 00:53:17.212000 audit: BPF prog-id=210 op=UNLOAD May 16 00:53:17.212000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { perfmon } for pid=4675 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit[4675]: AVC avc: denied { bpf } for pid=4675 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 16 00:53:17.212000 audit: BPF prog-id=212 op=LOAD May 16 00:53:17.212000 audit[4675]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4362 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393636396461313538616234396262653466396136663461366631 May 16 00:53:17.227425 env[1219]: time="2025-05-16T00:53:17.227357364Z" level=info msg="StartContainer for \"849669da158ab49bbe4f9a6f4a6f16ebbe788831d11fa1c65228383c84493291\" returns successfully" May 16 00:53:17.303000 audit[4611]: AVC avc: denied { watch } for pid=4611 comm="apiserver" path="/calico-apiserver-certs/..2025_05_16_00_52_56.1490751906/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c784,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c784,c891 tclass=file permissive=0 May 16 00:53:17.303000 audit[4611]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000d905e0 a2=fc6 a3=0 items=0 ppid=4173 pid=4611 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c784,c891 key=(null) May 16 00:53:17.303000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 16 00:53:17.324904 kubelet[1970]: I0516 00:53:17.324693 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65756f6c56-8m8p4" podStartSLOduration=28.429571463 podStartE2EDuration="31.324678086s" podCreationTimestamp="2025-05-16 00:52:46 +0000 UTC" firstStartedPulling="2025-05-16 00:53:12.034006926 +0000 UTC m=+41.540644058" lastFinishedPulling="2025-05-16 00:53:14.929113549 +0000 UTC m=+44.435750681" observedRunningTime="2025-05-16 00:53:15.806774754 +0000 UTC m=+45.313411886" watchObservedRunningTime="2025-05-16 00:53:17.324678086 +0000 UTC m=+46.831315218" May 16 00:53:17.337000 audit[4707]: NETFILTER_CFG table=filter:126 family=2 entries=13 op=nft_register_rule pid=4707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:17.337000 audit[4707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe0c0ab00 a2=0 a3=1 items=0 ppid=2082 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:17.343000 audit[4707]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_register_chain pid=4707 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:17.343000 audit[4707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe0c0ab00 a2=0 a3=1 items=0 ppid=2082 pid=4707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.343000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:17.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.134:22-10.0.0.1:39082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:17.640589 systemd[1]: Started sshd@9-10.0.0.134:22-10.0.0.1:39082.service. May 16 00:53:17.645116 kubelet[1970]: I0516 00:53:17.645076 1970 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 16 00:53:17.646887 kubelet[1970]: I0516 00:53:17.646857 1970 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 16 00:53:17.692000 audit[4709]: USER_ACCT pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.693901 sshd[4709]: Accepted publickey for core from 10.0.0.1 port 39082 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:17.694000 audit[4709]: CRED_ACQ pid=4709 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.694000 audit[4709]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe9ba0480 a2=3 a3=1 items=0 ppid=1 pid=4709 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.694000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:17.695694 sshd[4709]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:17.699229 systemd-logind[1209]: New session 10 of user core. May 16 00:53:17.700052 systemd[1]: Started session-10.scope. May 16 00:53:17.702000 audit[4709]: USER_START pid=4709 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.703000 audit[4711]: CRED_ACQ pid=4711 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.863903 sshd[4709]: pam_unix(sshd:session): session closed for user core May 16 00:53:17.866919 systemd[1]: Started sshd@10-10.0.0.134:22-10.0.0.1:39090.service. May 16 00:53:17.865000 audit[4709]: USER_END pid=4709 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.134:22-10.0.0.1:39090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:17.866000 audit[4709]: CRED_DISP pid=4709 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.868484 systemd[1]: sshd@9-10.0.0.134:22-10.0.0.1:39082.service: Deactivated successfully. May 16 00:53:17.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.134:22-10.0.0.1:39082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:17.869150 systemd[1]: session-10.scope: Deactivated successfully. May 16 00:53:17.869595 systemd-logind[1209]: Session 10 logged out. Waiting for processes to exit. May 16 00:53:17.870265 systemd-logind[1209]: Removed session 10. May 16 00:53:17.904000 audit[4722]: USER_ACCT pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.905000 audit[4722]: CRED_ACQ pid=4722 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.905000 audit[4722]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd51ca20 a2=3 a3=1 items=0 ppid=1 pid=4722 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:17.905000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:17.906833 sshd[4722]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:17.907836 sshd[4722]: Accepted publickey for core from 10.0.0.1 port 39090 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:17.912753 systemd-logind[1209]: New session 11 of user core. May 16 00:53:17.913080 systemd[1]: Started session-11.scope. May 16 00:53:17.916000 audit[4722]: USER_START pid=4722 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:17.917000 audit[4725]: CRED_ACQ pid=4725 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.105103 sshd[4722]: pam_unix(sshd:session): session closed for user core May 16 00:53:18.105000 audit[4722]: USER_END pid=4722 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.105000 audit[4722]: CRED_DISP pid=4722 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.109151 systemd[1]: Started sshd@11-10.0.0.134:22-10.0.0.1:39106.service. May 16 00:53:18.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.134:22-10.0.0.1:39106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:18.109938 systemd[1]: sshd@10-10.0.0.134:22-10.0.0.1:39090.service: Deactivated successfully. May 16 00:53:18.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.134:22-10.0.0.1:39090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:18.110779 systemd[1]: session-11.scope: Deactivated successfully. May 16 00:53:18.111763 systemd-logind[1209]: Session 11 logged out. Waiting for processes to exit. May 16 00:53:18.113038 systemd-logind[1209]: Removed session 11. May 16 00:53:18.168027 kubelet[1970]: I0516 00:53:18.167921 1970 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 16 00:53:18.170000 audit[4736]: USER_ACCT pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.171098 sshd[4736]: Accepted publickey for core from 10.0.0.1 port 39106 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:18.171000 audit[4736]: CRED_ACQ pid=4736 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.171000 audit[4736]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefb64cc0 a2=3 a3=1 items=0 ppid=1 pid=4736 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:18.171000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:18.172376 sshd[4736]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:18.175933 systemd-logind[1209]: New session 12 of user core. May 16 00:53:18.176308 systemd[1]: Started session-12.scope. May 16 00:53:18.180000 audit[4736]: USER_START pid=4736 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.181000 audit[4739]: CRED_ACQ pid=4739 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.198480 kubelet[1970]: I0516 00:53:18.198419 1970 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-qqqzr" podStartSLOduration=24.075263786 podStartE2EDuration="28.198403619s" podCreationTimestamp="2025-05-16 00:52:50 +0000 UTC" firstStartedPulling="2025-05-16 00:53:13.033117752 +0000 UTC m=+42.539754884" lastFinishedPulling="2025-05-16 00:53:17.156257585 +0000 UTC m=+46.662894717" observedRunningTime="2025-05-16 00:53:17.80573982 +0000 UTC m=+47.312376952" watchObservedRunningTime="2025-05-16 00:53:18.198403619 +0000 UTC m=+47.705040751" May 16 00:53:18.214000 audit[4741]: NETFILTER_CFG table=filter:128 family=2 entries=12 op=nft_register_rule pid=4741 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:18.214000 audit[4741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffffca5f910 a2=0 a3=1 items=0 ppid=2082 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:18.214000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:18.222000 audit[4741]: NETFILTER_CFG table=nat:129 family=2 entries=34 op=nft_register_chain pid=4741 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:18.222000 audit[4741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffffca5f910 a2=0 a3=1 items=0 ppid=2082 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:18.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:18.310250 sshd[4736]: pam_unix(sshd:session): session closed for user core May 16 00:53:18.310000 audit[4736]: USER_END pid=4736 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.310000 audit[4736]: CRED_DISP pid=4736 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:18.313111 systemd[1]: sshd@11-10.0.0.134:22-10.0.0.1:39106.service: Deactivated successfully. May 16 00:53:18.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.134:22-10.0.0.1:39106 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:18.313812 systemd[1]: session-12.scope: Deactivated successfully. May 16 00:53:18.314357 systemd-logind[1209]: Session 12 logged out. Waiting for processes to exit. May 16 00:53:18.315326 systemd-logind[1209]: Removed session 12. May 16 00:53:18.592082 env[1219]: time="2025-05-16T00:53:18.592030619Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:53:18.733641 env[1219]: time="2025-05-16T00:53:18.733569480Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:18.734686 env[1219]: time="2025-05-16T00:53:18.734633630Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:18.734952 kubelet[1970]: E0516 00:53:18.734899 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:53:18.735015 kubelet[1970]: E0516 00:53:18.734957 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:53:18.735110 kubelet[1970]: E0516 00:53:18.735065 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:47ced77672db4c51ba427a413e787eff,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-hhv8p,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-79849f5dcc-pm8bq_calico-system(4ab3eb70-a520-44d7-b50c-85edec9d15d0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:18.737635 env[1219]: time="2025-05-16T00:53:18.737597432Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:53:18.918606 env[1219]: time="2025-05-16T00:53:18.918472708Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:18.921579 env[1219]: time="2025-05-16T00:53:18.921539114Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:18.921787 kubelet[1970]: E0516 00:53:18.921747 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:53:18.921857 kubelet[1970]: E0516 00:53:18.921802 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:53:18.921948 kubelet[1970]: E0516 00:53:18.921911 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hhv8p,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-79849f5dcc-pm8bq_calico-system(4ab3eb70-a520-44d7-b50c-85edec9d15d0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:18.923469 kubelet[1970]: E0516 00:53:18.923402 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-79849f5dcc-pm8bq" podUID="4ab3eb70-a520-44d7-b50c-85edec9d15d0" May 16 00:53:23.314739 systemd[1]: Started sshd@12-10.0.0.134:22-10.0.0.1:57050.service. May 16 00:53:23.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.134:22-10.0.0.1:57050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:23.316133 kernel: kauditd_printk_skb: 127 callbacks suppressed May 16 00:53:23.316216 kernel: audit: type=1130 audit(1747356803.314:1440): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.134:22-10.0.0.1:57050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:23.358000 audit[4762]: USER_ACCT pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.361757 kernel: audit: type=1101 audit(1747356803.358:1441): pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.361838 sshd[4762]: Accepted publickey for core from 10.0.0.1 port 57050 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:23.363000 audit[4762]: CRED_ACQ pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.364339 sshd[4762]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:23.367600 kernel: audit: type=1103 audit(1747356803.363:1442): pid=4762 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.367682 kernel: audit: type=1006 audit(1747356803.363:1443): pid=4762 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 16 00:53:23.367725 kernel: audit: type=1300 audit(1747356803.363:1443): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5480660 a2=3 a3=1 items=0 ppid=1 pid=4762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:23.363000 audit[4762]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5480660 a2=3 a3=1 items=0 ppid=1 pid=4762 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:23.363000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:23.370814 kernel: audit: type=1327 audit(1747356803.363:1443): proctitle=737368643A20636F7265205B707269765D May 16 00:53:23.372178 systemd-logind[1209]: New session 13 of user core. May 16 00:53:23.372642 systemd[1]: Started session-13.scope. May 16 00:53:23.377000 audit[4762]: USER_START pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.377000 audit[4764]: CRED_ACQ pid=4764 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.382932 kernel: audit: type=1105 audit(1747356803.377:1444): pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.382992 kernel: audit: type=1103 audit(1747356803.377:1445): pid=4764 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.528779 sshd[4762]: pam_unix(sshd:session): session closed for user core May 16 00:53:23.529000 audit[4762]: USER_END pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.529000 audit[4762]: CRED_DISP pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.533020 systemd-logind[1209]: Session 13 logged out. Waiting for processes to exit. May 16 00:53:23.533949 systemd[1]: sshd@12-10.0.0.134:22-10.0.0.1:57050.service: Deactivated successfully. May 16 00:53:23.534701 systemd[1]: session-13.scope: Deactivated successfully. May 16 00:53:23.534848 kernel: audit: type=1106 audit(1747356803.529:1446): pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.534880 kernel: audit: type=1104 audit(1747356803.529:1447): pid=4762 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:23.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.134:22-10.0.0.1:57050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:23.535512 systemd-logind[1209]: Removed session 13. May 16 00:53:27.127401 systemd[1]: run-containerd-runc-k8s.io-a60d90c9edefad74c0139308823bfccb43b262f101657d377b33a933a3553778-runc.APBsRi.mount: Deactivated successfully. May 16 00:53:27.591830 env[1219]: time="2025-05-16T00:53:27.591785033Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:53:27.733904 env[1219]: time="2025-05-16T00:53:27.733853361Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:27.734897 env[1219]: time="2025-05-16T00:53:27.734860866Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:27.735194 kubelet[1970]: E0516 00:53:27.735158 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:53:27.735618 kubelet[1970]: E0516 00:53:27.735204 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:53:27.735618 kubelet[1970]: E0516 00:53:27.735341 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-x8g9s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-8jmjf_calico-system(c1af5719-afc6-4505-975b-6308449f6dc4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:27.736560 kubelet[1970]: E0516 00:53:27.736500 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8jmjf" podUID="c1af5719-afc6-4505-975b-6308449f6dc4" May 16 00:53:28.090000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520966 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.090000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.090000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=80 a1=40111a45d0 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:53:28.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:53:28.090000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=4010d6a090 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:53:28.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:53:28.090000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.090000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=82 a1=40111842a0 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:53:28.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:53:28.090000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.090000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=80 a1=4010d6a0f0 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:53:28.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:53:28.090000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.090000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=80 a1=40101f4880 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:53:28.090000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:53:28.106000 audit[1839]: AVC avc: denied { watch } for pid=1839 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.106000 audit[1839]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=80 a1=4011734bd0 a2=fc6 a3=0 items=0 ppid=1684 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c586,c1000 key=(null) May 16 00:53:28.106000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313334002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 16 00:53:28.532590 systemd[1]: Started sshd@13-10.0.0.134:22-10.0.0.1:57066.service. May 16 00:53:28.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.134:22-10.0.0.1:57066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:28.533844 kernel: kauditd_printk_skb: 19 callbacks suppressed May 16 00:53:28.533917 kernel: audit: type=1130 audit(1747356808.531:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.134:22-10.0.0.1:57066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:28.575000 audit[4801]: USER_ACCT pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.580033 kernel: audit: type=1101 audit(1747356808.575:1456): pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.580086 sshd[4801]: Accepted publickey for core from 10.0.0.1 port 57066 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:28.579000 audit[4801]: CRED_ACQ pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.581250 sshd[4801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:28.584403 kernel: audit: type=1103 audit(1747356808.579:1457): pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.584472 kernel: audit: type=1006 audit(1747356808.579:1458): pid=4801 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 16 00:53:28.584498 kernel: audit: type=1300 audit(1747356808.579:1458): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec721640 a2=3 a3=1 items=0 ppid=1 pid=4801 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:28.579000 audit[4801]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec721640 a2=3 a3=1 items=0 ppid=1 pid=4801 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:28.584797 systemd-logind[1209]: New session 14 of user core. May 16 00:53:28.585636 systemd[1]: Started session-14.scope. May 16 00:53:28.586602 kernel: audit: type=1327 audit(1747356808.579:1458): proctitle=737368643A20636F7265205B707269765D May 16 00:53:28.579000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:28.588000 audit[4801]: USER_START pid=4801 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.590000 audit[4803]: CRED_ACQ pid=4803 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.595224 kernel: audit: type=1105 audit(1747356808.588:1459): pid=4801 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.595304 kernel: audit: type=1103 audit(1747356808.590:1460): pid=4803 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.637000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.637000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400261a1e0 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:53:28.644437 kernel: audit: type=1400 audit(1747356808.637:1461): avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520970 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.644503 kernel: audit: type=1300 audit(1747356808.637:1461): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=400261a1e0 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:53:28.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:53:28.637000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:28.637000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40031060e0 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:53:28.637000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:53:28.745686 sshd[4801]: pam_unix(sshd:session): session closed for user core May 16 00:53:28.745000 audit[4801]: USER_END pid=4801 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.745000 audit[4801]: CRED_DISP pid=4801 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:28.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.134:22-10.0.0.1:57066 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:28.749225 systemd[1]: sshd@13-10.0.0.134:22-10.0.0.1:57066.service: Deactivated successfully. May 16 00:53:28.750020 systemd[1]: session-14.scope: Deactivated successfully. May 16 00:53:28.750514 systemd-logind[1209]: Session 14 logged out. Waiting for processes to exit. May 16 00:53:28.751269 systemd-logind[1209]: Removed session 14. May 16 00:53:30.552764 env[1219]: time="2025-05-16T00:53:30.552568261Z" level=info msg="StopPodSandbox for \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\"" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.586 [WARNING][4823] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qqqzr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0fcc127d-35ef-42b4-989b-8f2570d7bd7f", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e", Pod:"csi-node-driver-qqqzr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali126869cde1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.587 [INFO][4823] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.587 [INFO][4823] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" iface="eth0" netns="" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.587 [INFO][4823] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.587 [INFO][4823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.618 [INFO][4831] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.618 [INFO][4831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.618 [INFO][4831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.628 [WARNING][4831] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.629 [INFO][4831] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.630 [INFO][4831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:30.633699 env[1219]: 2025-05-16 00:53:30.632 [INFO][4823] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.634477 env[1219]: time="2025-05-16T00:53:30.633738206Z" level=info msg="TearDown network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\" successfully" May 16 00:53:30.634477 env[1219]: time="2025-05-16T00:53:30.633766807Z" level=info msg="StopPodSandbox for \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\" returns successfully" May 16 00:53:30.634477 env[1219]: time="2025-05-16T00:53:30.634432302Z" level=info msg="RemovePodSandbox for \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\"" May 16 00:53:30.634556 env[1219]: time="2025-05-16T00:53:30.634465623Z" level=info msg="Forcibly stopping sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\"" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.666 [WARNING][4851] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--qqqzr-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"0fcc127d-35ef-42b4-989b-8f2570d7bd7f", ResourceVersion:"1185", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1786d20ea5172769a6ad5b10f233278c18a1434c06776b5ac23d23528a6a093e", Pod:"csi-node-driver-qqqzr", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali126869cde1d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.667 [INFO][4851] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.667 [INFO][4851] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" iface="eth0" netns="" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.667 [INFO][4851] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.667 [INFO][4851] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.686 [INFO][4859] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.686 [INFO][4859] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.686 [INFO][4859] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.694 [WARNING][4859] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.694 [INFO][4859] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" HandleID="k8s-pod-network.578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" Workload="localhost-k8s-csi--node--driver--qqqzr-eth0" May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.696 [INFO][4859] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:30.699658 env[1219]: 2025-05-16 00:53:30.698 [INFO][4851] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914" May 16 00:53:30.700093 env[1219]: time="2025-05-16T00:53:30.699669313Z" level=info msg="TearDown network for sandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\" successfully" May 16 00:53:30.702571 env[1219]: time="2025-05-16T00:53:30.702517740Z" level=info msg="RemovePodSandbox \"578f5cbe5cea3553ddf5d685131b07be856065d179b66185f9ae7fc4436f3914\" returns successfully" May 16 00:53:30.703176 env[1219]: time="2025-05-16T00:53:30.703138435Z" level=info msg="StopPodSandbox for \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\"" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.738 [WARNING][4876] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0", GenerateName:"calico-kube-controllers-544774848b-", Namespace:"calico-system", SelfLink:"", UID:"823071d7-6c7b-4b75-a341-65ab7c7542be", ResourceVersion:"1132", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544774848b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24", Pod:"calico-kube-controllers-544774848b-fjrtt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266836e3c00", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.738 [INFO][4876] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.738 [INFO][4876] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" iface="eth0" netns="" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.738 [INFO][4876] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.738 [INFO][4876] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.755 [INFO][4885] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.755 [INFO][4885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.755 [INFO][4885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.764 [WARNING][4885] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.764 [INFO][4885] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.765 [INFO][4885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:30.768909 env[1219]: 2025-05-16 00:53:30.767 [INFO][4876] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.769491 env[1219]: time="2025-05-16T00:53:30.769438951Z" level=info msg="TearDown network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\" successfully" May 16 00:53:30.769564 env[1219]: time="2025-05-16T00:53:30.769547554Z" level=info msg="StopPodSandbox for \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\" returns successfully" May 16 00:53:30.770092 env[1219]: time="2025-05-16T00:53:30.770065606Z" level=info msg="RemovePodSandbox for \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\"" May 16 00:53:30.770302 env[1219]: time="2025-05-16T00:53:30.770265010Z" level=info msg="Forcibly stopping sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\"" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.802 [WARNING][4903] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0", GenerateName:"calico-kube-controllers-544774848b-", Namespace:"calico-system", SelfLink:"", UID:"823071d7-6c7b-4b75-a341-65ab7c7542be", ResourceVersion:"1132", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544774848b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ed478123106578a6d90b279940e6ff2633b9866fa76c52f3133a78cd8ba2d24", Pod:"calico-kube-controllers-544774848b-fjrtt", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali266836e3c00", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.802 [INFO][4903] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.802 [INFO][4903] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" iface="eth0" netns="" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.802 [INFO][4903] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.802 [INFO][4903] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.820 [INFO][4913] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.821 [INFO][4913] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.821 [INFO][4913] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.829 [WARNING][4913] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.829 [INFO][4913] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" HandleID="k8s-pod-network.a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" Workload="localhost-k8s-calico--kube--controllers--544774848b--fjrtt-eth0" May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.832 [INFO][4913] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:30.835708 env[1219]: 2025-05-16 00:53:30.834 [INFO][4903] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b" May 16 00:53:30.836403 env[1219]: time="2025-05-16T00:53:30.836369802Z" level=info msg="TearDown network for sandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\" successfully" May 16 00:53:30.844032 env[1219]: time="2025-05-16T00:53:30.843998301Z" level=info msg="RemovePodSandbox \"a37d19f02a7b484bd27d94e812a7d895f9e4a42a73c5891541933b256e8a661b\" returns successfully" May 16 00:53:30.844480 env[1219]: time="2025-05-16T00:53:30.844448192Z" level=info msg="StopPodSandbox for \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\"" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.875 [WARNING][4931] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"7c691cdc-45e5-4cdc-af31-184a9aa2f135", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d", Pod:"coredns-674b8bbfcf-fm8jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie735435a353", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.876 [INFO][4931] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.876 [INFO][4931] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" iface="eth0" netns="" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.876 [INFO][4931] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.876 [INFO][4931] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.894 [INFO][4941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.894 [INFO][4941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.894 [INFO][4941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.903 [WARNING][4941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.903 [INFO][4941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.904 [INFO][4941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:30.907768 env[1219]: 2025-05-16 00:53:30.906 [INFO][4931] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.910687 env[1219]: time="2025-05-16T00:53:30.910647146Z" level=info msg="TearDown network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\" successfully" May 16 00:53:30.911081 env[1219]: time="2025-05-16T00:53:30.911058275Z" level=info msg="StopPodSandbox for \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\" returns successfully" May 16 00:53:30.911463 env[1219]: time="2025-05-16T00:53:30.911440964Z" level=info msg="RemovePodSandbox for \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\"" May 16 00:53:30.911625 env[1219]: time="2025-05-16T00:53:30.911575447Z" level=info msg="Forcibly stopping sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\"" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.959 [WARNING][4960] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"7c691cdc-45e5-4cdc-af31-184a9aa2f135", ResourceVersion:"1124", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"68651d1f10c8d517268754ed10e4c58dfa5fcda6839cf5e25eaf0f099974687d", Pod:"coredns-674b8bbfcf-fm8jh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie735435a353", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.960 [INFO][4960] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.960 [INFO][4960] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" iface="eth0" netns="" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.960 [INFO][4960] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.960 [INFO][4960] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.979 [INFO][4970] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.979 [INFO][4970] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.979 [INFO][4970] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.988 [WARNING][4970] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.988 [INFO][4970] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" HandleID="k8s-pod-network.80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" Workload="localhost-k8s-coredns--674b8bbfcf--fm8jh-eth0" May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.990 [INFO][4970] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:30.993785 env[1219]: 2025-05-16 00:53:30.991 [INFO][4960] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e" May 16 00:53:30.994304 env[1219]: time="2025-05-16T00:53:30.994264988Z" level=info msg="TearDown network for sandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\" successfully" May 16 00:53:30.998827 env[1219]: time="2025-05-16T00:53:30.998780534Z" level=info msg="RemovePodSandbox \"80dd6298dee77990228340c7ceb137ce19eb6b389c94d032bcfef7e64d606a1e\" returns successfully" May 16 00:53:30.999340 env[1219]: time="2025-05-16T00:53:30.999303546Z" level=info msg="StopPodSandbox for \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\"" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.031 [WARNING][4987] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"febbbaef-d3b9-46a5-8f7d-6d7aed958b28", ResourceVersion:"1171", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe", Pod:"calico-apiserver-65756f6c56-nx9wz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calief3b2c0b1e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.032 [INFO][4987] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.032 [INFO][4987] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" iface="eth0" netns="" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.032 [INFO][4987] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.032 [INFO][4987] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.050 [INFO][4996] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.051 [INFO][4996] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.051 [INFO][4996] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.059 [WARNING][4996] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.059 [INFO][4996] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.061 [INFO][4996] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.064256 env[1219]: 2025-05-16 00:53:31.062 [INFO][4987] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.064748 env[1219]: time="2025-05-16T00:53:31.064276337Z" level=info msg="TearDown network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\" successfully" May 16 00:53:31.064748 env[1219]: time="2025-05-16T00:53:31.064306218Z" level=info msg="StopPodSandbox for \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\" returns successfully" May 16 00:53:31.064844 env[1219]: time="2025-05-16T00:53:31.064795989Z" level=info msg="RemovePodSandbox for \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\"" May 16 00:53:31.064877 env[1219]: time="2025-05-16T00:53:31.064840830Z" level=info msg="Forcibly stopping sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\"" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.095 [WARNING][5014] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"febbbaef-d3b9-46a5-8f7d-6d7aed958b28", ResourceVersion:"1171", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8f790d3487dea737e1dadc620ec0261a852ba6cb7030ff5f1f292a8648c627fe", Pod:"calico-apiserver-65756f6c56-nx9wz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calief3b2c0b1e9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.096 [INFO][5014] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.096 [INFO][5014] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" iface="eth0" netns="" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.096 [INFO][5014] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.096 [INFO][5014] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.113 [INFO][5023] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.113 [INFO][5023] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.113 [INFO][5023] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.123 [WARNING][5023] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.123 [INFO][5023] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" HandleID="k8s-pod-network.7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" Workload="localhost-k8s-calico--apiserver--65756f6c56--nx9wz-eth0" May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.124 [INFO][5023] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.128381 env[1219]: 2025-05-16 00:53:31.126 [INFO][5014] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496" May 16 00:53:31.130411 env[1219]: time="2025-05-16T00:53:31.128352626Z" level=info msg="TearDown network for sandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\" successfully" May 16 00:53:31.133301 env[1219]: time="2025-05-16T00:53:31.133267180Z" level=info msg="RemovePodSandbox \"7f02884302537a9af2cad73af3d495d377731e3eaa7bd4858edf2f432735e496\" returns successfully" May 16 00:53:31.133818 env[1219]: time="2025-05-16T00:53:31.133760752Z" level=info msg="StopPodSandbox for \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\"" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.167 [WARNING][5041] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" WorkloadEndpoint="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.167 [INFO][5041] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.167 [INFO][5041] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" iface="eth0" netns="" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.167 [INFO][5041] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.167 [INFO][5041] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.184 [INFO][5050] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.184 [INFO][5050] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.184 [INFO][5050] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.193 [WARNING][5050] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.193 [INFO][5050] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.195 [INFO][5050] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.198702 env[1219]: 2025-05-16 00:53:31.196 [INFO][5041] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.199116 env[1219]: time="2025-05-16T00:53:31.198745862Z" level=info msg="TearDown network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\" successfully" May 16 00:53:31.199116 env[1219]: time="2025-05-16T00:53:31.198777223Z" level=info msg="StopPodSandbox for \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\" returns successfully" May 16 00:53:31.199401 env[1219]: time="2025-05-16T00:53:31.199343916Z" level=info msg="RemovePodSandbox for \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\"" May 16 00:53:31.199531 env[1219]: time="2025-05-16T00:53:31.199492399Z" level=info msg="Forcibly stopping sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\"" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.231 [WARNING][5068] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" WorkloadEndpoint="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.231 [INFO][5068] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.231 [INFO][5068] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" iface="eth0" netns="" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.231 [INFO][5068] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.231 [INFO][5068] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.250 [INFO][5076] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.250 [INFO][5076] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.250 [INFO][5076] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.260 [WARNING][5076] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.261 [INFO][5076] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" HandleID="k8s-pod-network.443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" Workload="localhost-k8s-whisker--78cc859745--8qbkv-eth0" May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.263 [INFO][5076] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.266691 env[1219]: 2025-05-16 00:53:31.264 [INFO][5068] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907" May 16 00:53:31.267189 env[1219]: time="2025-05-16T00:53:31.267142491Z" level=info msg="TearDown network for sandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\" successfully" May 16 00:53:31.270150 env[1219]: time="2025-05-16T00:53:31.270120360Z" level=info msg="RemovePodSandbox \"443c5cd484fe11e20d09dbf8bd3979bf8c7c7c2c92476e02fc02b03e35c4e907\" returns successfully" May 16 00:53:31.270768 env[1219]: time="2025-05-16T00:53:31.270739455Z" level=info msg="StopPodSandbox for \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\"" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.303 [WARNING][5094] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"656cf93b-6d43-43bb-9bf2-366b4ce24852", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78", Pod:"coredns-674b8bbfcf-8c9g9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicdf2a112592", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.303 [INFO][5094] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.303 [INFO][5094] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" iface="eth0" netns="" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.303 [INFO][5094] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.303 [INFO][5094] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.327 [INFO][5103] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.327 [INFO][5103] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.327 [INFO][5103] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.336 [WARNING][5103] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.336 [INFO][5103] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.337 [INFO][5103] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.341303 env[1219]: 2025-05-16 00:53:31.339 [INFO][5094] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.341805 env[1219]: time="2025-05-16T00:53:31.341322855Z" level=info msg="TearDown network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\" successfully" May 16 00:53:31.341805 env[1219]: time="2025-05-16T00:53:31.341356256Z" level=info msg="StopPodSandbox for \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\" returns successfully" May 16 00:53:31.342040 env[1219]: time="2025-05-16T00:53:31.342011111Z" level=info msg="RemovePodSandbox for \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\"" May 16 00:53:31.342155 env[1219]: time="2025-05-16T00:53:31.342118794Z" level=info msg="Forcibly stopping sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\"" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.374 [WARNING][5121] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"656cf93b-6d43-43bb-9bf2-366b4ce24852", ResourceVersion:"1072", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0dff4c38787ab8cd94d1e4168841c353b0b174a2ec432c6cb2f37ea801de8e78", Pod:"coredns-674b8bbfcf-8c9g9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicdf2a112592", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.374 [INFO][5121] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.374 [INFO][5121] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" iface="eth0" netns="" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.374 [INFO][5121] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.374 [INFO][5121] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.400 [INFO][5130] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.401 [INFO][5130] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.401 [INFO][5130] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.410 [WARNING][5130] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.411 [INFO][5130] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" HandleID="k8s-pod-network.7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" Workload="localhost-k8s-coredns--674b8bbfcf--8c9g9-eth0" May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.412 [INFO][5130] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.416328 env[1219]: 2025-05-16 00:53:31.414 [INFO][5121] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd" May 16 00:53:31.417063 env[1219]: time="2025-05-16T00:53:31.417007294Z" level=info msg="TearDown network for sandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\" successfully" May 16 00:53:31.419927 env[1219]: time="2025-05-16T00:53:31.419893081Z" level=info msg="RemovePodSandbox \"7408b12218bd74eee550d93d605b2ed2a2c9b5f27ec9ad3b834877a5b254d2fd\" returns successfully" May 16 00:53:31.420594 env[1219]: time="2025-05-16T00:53:31.420560897Z" level=info msg="StopPodSandbox for \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\"" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.454 [WARNING][5148] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"c1af5719-afc6-4505-975b-6308449f6dc4", ResourceVersion:"1259", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847", Pod:"goldmane-78d55f7ddc-8jmjf", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6c41d21b28f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.454 [INFO][5148] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.454 [INFO][5148] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" iface="eth0" netns="" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.454 [INFO][5148] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.454 [INFO][5148] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.472 [INFO][5157] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.472 [INFO][5157] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.473 [INFO][5157] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.481 [WARNING][5157] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.482 [INFO][5157] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.483 [INFO][5157] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.487316 env[1219]: 2025-05-16 00:53:31.485 [INFO][5148] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.487817 env[1219]: time="2025-05-16T00:53:31.487344688Z" level=info msg="TearDown network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\" successfully" May 16 00:53:31.487817 env[1219]: time="2025-05-16T00:53:31.487377009Z" level=info msg="StopPodSandbox for \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\" returns successfully" May 16 00:53:31.488049 env[1219]: time="2025-05-16T00:53:31.488018664Z" level=info msg="RemovePodSandbox for \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\"" May 16 00:53:31.488158 env[1219]: time="2025-05-16T00:53:31.488123187Z" level=info msg="Forcibly stopping sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\"" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.520 [WARNING][5176] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"c1af5719-afc6-4505-975b-6308449f6dc4", ResourceVersion:"1259", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d2f118110c35da061812b1b99081bc889cbf054d4bef2898fb296b6fb75dc847", Pod:"goldmane-78d55f7ddc-8jmjf", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali6c41d21b28f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.520 [INFO][5176] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.520 [INFO][5176] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" iface="eth0" netns="" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.520 [INFO][5176] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.521 [INFO][5176] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.538 [INFO][5184] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.539 [INFO][5184] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.539 [INFO][5184] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.547 [WARNING][5184] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.547 [INFO][5184] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" HandleID="k8s-pod-network.71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" Workload="localhost-k8s-goldmane--78d55f7ddc--8jmjf-eth0" May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.548 [INFO][5184] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.552472 env[1219]: 2025-05-16 00:53:31.550 [INFO][5176] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235" May 16 00:53:31.553085 env[1219]: time="2025-05-16T00:53:31.552491042Z" level=info msg="TearDown network for sandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\" successfully" May 16 00:53:31.555301 env[1219]: time="2025-05-16T00:53:31.555274067Z" level=info msg="RemovePodSandbox \"71e6f270c69a22874c072f63a0c3cd3d19764c1b18c506b33d680c16b4cab235\" returns successfully" May 16 00:53:31.555764 env[1219]: time="2025-05-16T00:53:31.555734998Z" level=info msg="StopPodSandbox for \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\"" May 16 00:53:31.598957 kubelet[1970]: E0516 00:53:31.598908 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-79849f5dcc-pm8bq" podUID="4ab3eb70-a520-44d7-b50c-85edec9d15d0" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.586 [WARNING][5202] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"a4982601-db92-4c47-a127-bf922c30b131", ResourceVersion:"1199", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989", Pod:"calico-apiserver-65756f6c56-8m8p4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calied94130bf8f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.586 [INFO][5202] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.586 [INFO][5202] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" iface="eth0" netns="" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.586 [INFO][5202] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.586 [INFO][5202] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.616 [INFO][5211] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.616 [INFO][5211] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.616 [INFO][5211] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.625 [WARNING][5211] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.625 [INFO][5211] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.627 [INFO][5211] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.630660 env[1219]: 2025-05-16 00:53:31.629 [INFO][5202] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.631107 env[1219]: time="2025-05-16T00:53:31.630677819Z" level=info msg="TearDown network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\" successfully" May 16 00:53:31.631107 env[1219]: time="2025-05-16T00:53:31.630739141Z" level=info msg="StopPodSandbox for \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\" returns successfully" May 16 00:53:31.631189 env[1219]: time="2025-05-16T00:53:31.631122870Z" level=info msg="RemovePodSandbox for \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\"" May 16 00:53:31.631189 env[1219]: time="2025-05-16T00:53:31.631156670Z" level=info msg="Forcibly stopping sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\"" May 16 00:53:31.646000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:31.646000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40030980a0 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:53:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:53:31.646000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:31.646000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40031ae820 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:53:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:53:31.646000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:31.646000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003036c20 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:53:31.646000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:53:31.647000 audit[1853]: AVC avc: denied { watch } for pid=1853 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520964 scontext=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 16 00:53:31.647000 audit[1853]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4003036c40 a2=fc6 a3=0 items=0 ppid=1681 pid=1853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c807,c1011 key=(null) May 16 00:53:31.647000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.664 [WARNING][5228] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0", GenerateName:"calico-apiserver-65756f6c56-", Namespace:"calico-apiserver", SelfLink:"", UID:"a4982601-db92-4c47-a127-bf922c30b131", ResourceVersion:"1199", Generation:0, CreationTimestamp:time.Date(2025, time.May, 16, 0, 52, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65756f6c56", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cef4e71eb009b0575fd3b6f52b59030cc3cfc1757e5a846919ad36e3d20cf989", Pod:"calico-apiserver-65756f6c56-8m8p4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calied94130bf8f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.664 [INFO][5228] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.664 [INFO][5228] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" iface="eth0" netns="" May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.664 [INFO][5228] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.664 [INFO][5228] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.682 [INFO][5237] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.682 [INFO][5237] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.682 [INFO][5237] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.691 [WARNING][5237] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.691 [INFO][5237] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" HandleID="k8s-pod-network.a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" Workload="localhost-k8s-calico--apiserver--65756f6c56--8m8p4-eth0" May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.692 [INFO][5237] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 16 00:53:31.697499 env[1219]: 2025-05-16 00:53:31.694 [INFO][5228] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496" May 16 00:53:31.698054 env[1219]: time="2025-05-16T00:53:31.697531213Z" level=info msg="TearDown network for sandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\" successfully" May 16 00:53:31.700449 env[1219]: time="2025-05-16T00:53:31.700407080Z" level=info msg="RemovePodSandbox \"a07c26d6b7536be6f86fa210012e8a60d80f05c8c3364b475e2db558b8cb7496\" returns successfully" May 16 00:53:33.751064 systemd[1]: Started sshd@14-10.0.0.134:22-10.0.0.1:60362.service. May 16 00:53:33.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.134:22-10.0.0.1:60362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:33.752254 kernel: kauditd_printk_skb: 19 callbacks suppressed May 16 00:53:33.752326 kernel: audit: type=1130 audit(1747356813.749:1470): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.134:22-10.0.0.1:60362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:33.793000 audit[5248]: USER_ACCT pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.795606 sshd[5248]: Accepted publickey for core from 10.0.0.1 port 60362 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:33.794000 audit[5248]: CRED_ACQ pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.798099 sshd[5248]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:33.800011 kernel: audit: type=1101 audit(1747356813.793:1471): pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.800072 kernel: audit: type=1103 audit(1747356813.794:1472): pid=5248 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.800096 kernel: audit: type=1006 audit(1747356813.794:1473): pid=5248 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 16 00:53:33.794000 audit[5248]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8f2d3b0 a2=3 a3=1 items=0 ppid=1 pid=5248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:33.803848 kernel: audit: type=1300 audit(1747356813.794:1473): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8f2d3b0 a2=3 a3=1 items=0 ppid=1 pid=5248 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:33.794000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:33.804837 kernel: audit: type=1327 audit(1747356813.794:1473): proctitle=737368643A20636F7265205B707269765D May 16 00:53:33.807129 systemd-logind[1209]: New session 15 of user core. May 16 00:53:33.807982 systemd[1]: Started session-15.scope. May 16 00:53:33.809000 audit[5248]: USER_START pid=5248 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.811000 audit[5250]: CRED_ACQ pid=5250 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.815994 kernel: audit: type=1105 audit(1747356813.809:1474): pid=5248 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.816036 kernel: audit: type=1103 audit(1747356813.811:1475): pid=5250 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.962171 sshd[5248]: pam_unix(sshd:session): session closed for user core May 16 00:53:33.961000 audit[5248]: USER_END pid=5248 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.964630 systemd[1]: sshd@14-10.0.0.134:22-10.0.0.1:60362.service: Deactivated successfully. May 16 00:53:33.965397 systemd[1]: session-15.scope: Deactivated successfully. May 16 00:53:33.961000 audit[5248]: CRED_DISP pid=5248 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.967800 kernel: audit: type=1106 audit(1747356813.961:1476): pid=5248 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.967883 kernel: audit: type=1104 audit(1747356813.961:1477): pid=5248 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:33.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.134:22-10.0.0.1:60362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:33.968266 systemd-logind[1209]: Session 15 logged out. Waiting for processes to exit. May 16 00:53:33.969112 systemd-logind[1209]: Removed session 15. May 16 00:53:38.591736 kubelet[1970]: E0516 00:53:38.591693 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:38.967119 systemd[1]: Started sshd@15-10.0.0.134:22-10.0.0.1:60368.service. May 16 00:53:38.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.134:22-10.0.0.1:60368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:38.968330 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:53:38.968380 kernel: audit: type=1130 audit(1747356818.965:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.134:22-10.0.0.1:60368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:39.010000 audit[5287]: USER_ACCT pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.012289 sshd[5287]: Accepted publickey for core from 10.0.0.1 port 60368 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:39.013813 sshd[5287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:39.011000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.016687 kernel: audit: type=1101 audit(1747356819.010:1480): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.016755 kernel: audit: type=1103 audit(1747356819.011:1481): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.016838 kernel: audit: type=1006 audit(1747356819.011:1482): pid=5287 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 16 00:53:39.017743 systemd-logind[1209]: New session 16 of user core. May 16 00:53:39.018211 kernel: audit: type=1300 audit(1747356819.011:1482): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed9364e0 a2=3 a3=1 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:39.011000 audit[5287]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed9364e0 a2=3 a3=1 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:39.018188 systemd[1]: Started session-16.scope. May 16 00:53:39.020357 kernel: audit: type=1327 audit(1747356819.011:1482): proctitle=737368643A20636F7265205B707269765D May 16 00:53:39.011000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:39.020000 audit[5287]: USER_START pid=5287 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.022000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.027058 kernel: audit: type=1105 audit(1747356819.020:1483): pid=5287 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.027110 kernel: audit: type=1103 audit(1747356819.022:1484): pid=5289 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.154796 sshd[5287]: pam_unix(sshd:session): session closed for user core May 16 00:53:39.154000 audit[5287]: USER_END pid=5287 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.158469 systemd[1]: sshd@15-10.0.0.134:22-10.0.0.1:60368.service: Deactivated successfully. May 16 00:53:39.154000 audit[5287]: CRED_DISP pid=5287 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.159149 systemd[1]: session-16.scope: Deactivated successfully. May 16 00:53:39.159742 systemd-logind[1209]: Session 16 logged out. Waiting for processes to exit. May 16 00:53:39.160881 kernel: audit: type=1106 audit(1747356819.154:1485): pid=5287 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.161007 kernel: audit: type=1104 audit(1747356819.154:1486): pid=5287 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.134:22-10.0.0.1:60368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:39.161106 systemd[1]: Started sshd@16-10.0.0.134:22-10.0.0.1:60370.service. May 16 00:53:39.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.134:22-10.0.0.1:60370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:39.162082 systemd-logind[1209]: Removed session 16. May 16 00:53:39.198000 audit[5300]: USER_ACCT pid=5300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.200666 sshd[5300]: Accepted publickey for core from 10.0.0.1 port 60370 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:39.199000 audit[5300]: CRED_ACQ pid=5300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.199000 audit[5300]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc89a6540 a2=3 a3=1 items=0 ppid=1 pid=5300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:39.199000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:39.201784 sshd[5300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:39.204995 systemd-logind[1209]: New session 17 of user core. May 16 00:53:39.206003 systemd[1]: Started session-17.scope. May 16 00:53:39.208000 audit[5300]: USER_START pid=5300 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.209000 audit[5302]: CRED_ACQ pid=5302 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.412544 sshd[5300]: pam_unix(sshd:session): session closed for user core May 16 00:53:39.413000 audit[5300]: USER_END pid=5300 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.413000 audit[5300]: CRED_DISP pid=5300 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.417305 systemd[1]: Started sshd@17-10.0.0.134:22-10.0.0.1:60372.service. May 16 00:53:39.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.134:22-10.0.0.1:60372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:39.418111 systemd[1]: sshd@16-10.0.0.134:22-10.0.0.1:60370.service: Deactivated successfully. May 16 00:53:39.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.134:22-10.0.0.1:60370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:39.419360 systemd[1]: session-17.scope: Deactivated successfully. May 16 00:53:39.420132 systemd-logind[1209]: Session 17 logged out. Waiting for processes to exit. May 16 00:53:39.421243 systemd-logind[1209]: Removed session 17. May 16 00:53:39.457000 audit[5310]: USER_ACCT pid=5310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.459683 sshd[5310]: Accepted publickey for core from 10.0.0.1 port 60372 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:39.458000 audit[5310]: CRED_ACQ pid=5310 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.458000 audit[5310]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcf9438c0 a2=3 a3=1 items=0 ppid=1 pid=5310 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:39.458000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:39.460879 sshd[5310]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:39.464159 systemd-logind[1209]: New session 18 of user core. May 16 00:53:39.465042 systemd[1]: Started session-18.scope. May 16 00:53:39.467000 audit[5310]: USER_START pid=5310 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:39.468000 audit[5313]: CRED_ACQ pid=5313 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.157000 audit[5326]: NETFILTER_CFG table=filter:130 family=2 entries=24 op=nft_register_rule pid=5326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:40.157000 audit[5326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffc0a25f90 a2=0 a3=1 items=0 ppid=2082 pid=5326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:40.157000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:40.165710 sshd[5310]: pam_unix(sshd:session): session closed for user core May 16 00:53:40.165000 audit[5310]: USER_END pid=5310 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.165000 audit[5310]: CRED_DISP pid=5310 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.168000 audit[5326]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5326 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:40.170540 systemd[1]: Started sshd@18-10.0.0.134:22-10.0.0.1:60380.service. May 16 00:53:40.171132 systemd[1]: sshd@17-10.0.0.134:22-10.0.0.1:60372.service: Deactivated successfully. May 16 00:53:40.171923 systemd[1]: session-18.scope: Deactivated successfully. May 16 00:53:40.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.134:22-10.0.0.1:60380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:40.169000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.134:22-10.0.0.1:60372 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:40.172824 systemd-logind[1209]: Session 18 logged out. Waiting for processes to exit. May 16 00:53:40.168000 audit[5326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffc0a25f90 a2=0 a3=1 items=0 ppid=2082 pid=5326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:40.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:40.175050 systemd-logind[1209]: Removed session 18. May 16 00:53:40.191000 audit[5332]: NETFILTER_CFG table=filter:132 family=2 entries=36 op=nft_register_rule pid=5332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:40.191000 audit[5332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13432 a0=3 a1=ffffd78b4c70 a2=0 a3=1 items=0 ppid=2082 pid=5332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:40.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:40.197000 audit[5332]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5332 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:40.197000 audit[5332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffd78b4c70 a2=0 a3=1 items=0 ppid=2082 pid=5332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:40.197000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:40.209000 audit[5328]: USER_ACCT pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.211837 sshd[5328]: Accepted publickey for core from 10.0.0.1 port 60380 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:40.211000 audit[5328]: CRED_ACQ pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.211000 audit[5328]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeeefe240 a2=3 a3=1 items=0 ppid=1 pid=5328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:40.211000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:40.213456 sshd[5328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:40.219259 systemd[1]: Started session-19.scope. May 16 00:53:40.219567 systemd-logind[1209]: New session 19 of user core. May 16 00:53:40.222000 audit[5328]: USER_START pid=5328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.224000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.531706 sshd[5328]: pam_unix(sshd:session): session closed for user core May 16 00:53:40.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.134:22-10.0.0.1:60386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:40.535088 systemd[1]: Started sshd@19-10.0.0.134:22-10.0.0.1:60386.service. May 16 00:53:40.536000 audit[5328]: USER_END pid=5328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.536000 audit[5328]: CRED_DISP pid=5328 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.539909 systemd[1]: session-19.scope: Deactivated successfully. May 16 00:53:40.540664 systemd-logind[1209]: Session 19 logged out. Waiting for processes to exit. May 16 00:53:40.541278 systemd[1]: sshd@18-10.0.0.134:22-10.0.0.1:60380.service: Deactivated successfully. May 16 00:53:40.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.134:22-10.0.0.1:60380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:40.542089 systemd-logind[1209]: Removed session 19. May 16 00:53:40.576000 audit[5342]: USER_ACCT pid=5342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.578192 sshd[5342]: Accepted publickey for core from 10.0.0.1 port 60386 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:40.577000 audit[5342]: CRED_ACQ pid=5342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.577000 audit[5342]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5b502b0 a2=3 a3=1 items=0 ppid=1 pid=5342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:40.577000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:40.579834 sshd[5342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:40.585884 systemd-logind[1209]: New session 20 of user core. May 16 00:53:40.586706 systemd[1]: Started session-20.scope. May 16 00:53:40.589000 audit[5342]: USER_START pid=5342 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.591000 audit[5345]: CRED_ACQ pid=5345 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.726412 sshd[5342]: pam_unix(sshd:session): session closed for user core May 16 00:53:40.725000 audit[5342]: USER_END pid=5342 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.725000 audit[5342]: CRED_DISP pid=5342 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:40.729144 systemd[1]: sshd@19-10.0.0.134:22-10.0.0.1:60386.service: Deactivated successfully. May 16 00:53:40.729902 systemd[1]: session-20.scope: Deactivated successfully. May 16 00:53:40.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.134:22-10.0.0.1:60386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:40.730443 systemd-logind[1209]: Session 20 logged out. Waiting for processes to exit. May 16 00:53:40.731185 systemd-logind[1209]: Removed session 20. May 16 00:53:42.591946 kubelet[1970]: E0516 00:53:42.591899 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8jmjf" podUID="c1af5719-afc6-4505-975b-6308449f6dc4" May 16 00:53:42.592336 env[1219]: time="2025-05-16T00:53:42.592176855Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 16 00:53:42.802908 env[1219]: time="2025-05-16T00:53:42.802839942Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:42.803792 env[1219]: time="2025-05-16T00:53:42.803754847Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:42.804009 kubelet[1970]: E0516 00:53:42.803965 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:53:42.804112 kubelet[1970]: E0516 00:53:42.804091 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 16 00:53:42.804301 kubelet[1970]: E0516 00:53:42.804265 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:47ced77672db4c51ba427a413e787eff,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-hhv8p,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-79849f5dcc-pm8bq_calico-system(4ab3eb70-a520-44d7-b50c-85edec9d15d0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:42.806469 env[1219]: time="2025-05-16T00:53:42.806436283Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 16 00:53:42.968686 env[1219]: time="2025-05-16T00:53:42.968640400Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:42.969581 env[1219]: time="2025-05-16T00:53:42.969529986Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:42.971491 kubelet[1970]: E0516 00:53:42.971447 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:53:42.971644 kubelet[1970]: E0516 00:53:42.971623 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 16 00:53:42.971850 kubelet[1970]: E0516 00:53:42.971811 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-hhv8p,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-79849f5dcc-pm8bq_calico-system(4ab3eb70-a520-44d7-b50c-85edec9d15d0): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:42.973368 kubelet[1970]: E0516 00:53:42.973277 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-79849f5dcc-pm8bq" podUID="4ab3eb70-a520-44d7-b50c-85edec9d15d0" May 16 00:53:43.785751 systemd[1]: run-containerd-runc-k8s.io-a60d90c9edefad74c0139308823bfccb43b262f101657d377b33a933a3553778-runc.ncjPur.mount: Deactivated successfully. May 16 00:53:45.135000 audit[5382]: NETFILTER_CFG table=filter:134 family=2 entries=24 op=nft_register_rule pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:45.139853 kernel: kauditd_printk_skb: 57 callbacks suppressed May 16 00:53:45.139920 kernel: audit: type=1325 audit(1747356825.135:1528): table=filter:134 family=2 entries=24 op=nft_register_rule pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:45.139943 kernel: audit: type=1300 audit(1747356825.135:1528): arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd13bf6d0 a2=0 a3=1 items=0 ppid=2082 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:45.135000 audit[5382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffd13bf6d0 a2=0 a3=1 items=0 ppid=2082 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:45.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:45.144043 kernel: audit: type=1327 audit(1747356825.135:1528): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:45.149000 audit[5382]: NETFILTER_CFG table=nat:135 family=2 entries=106 op=nft_register_chain pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:45.149000 audit[5382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd13bf6d0 a2=0 a3=1 items=0 ppid=2082 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:45.156162 kernel: audit: type=1325 audit(1747356825.149:1529): table=nat:135 family=2 entries=106 op=nft_register_chain pid=5382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 16 00:53:45.156217 kernel: audit: type=1300 audit(1747356825.149:1529): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffd13bf6d0 a2=0 a3=1 items=0 ppid=2082 pid=5382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:45.156243 kernel: audit: type=1327 audit(1747356825.149:1529): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:45.149000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 16 00:53:45.731156 systemd[1]: Started sshd@20-10.0.0.134:22-10.0.0.1:34392.service. May 16 00:53:45.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.134:22-10.0.0.1:34392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:45.734745 kernel: audit: type=1130 audit(1747356825.729:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.134:22-10.0.0.1:34392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:45.771000 audit[5384]: USER_ACCT pid=5384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.773008 sshd[5384]: Accepted publickey for core from 10.0.0.1 port 34392 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:45.774115 sshd[5384]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:45.772000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.777585 kernel: audit: type=1101 audit(1747356825.771:1531): pid=5384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.778088 kernel: audit: type=1103 audit(1747356825.772:1532): pid=5384 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.778136 kernel: audit: type=1006 audit(1747356825.772:1533): pid=5384 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 16 00:53:45.772000 audit[5384]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff470bcd0 a2=3 a3=1 items=0 ppid=1 pid=5384 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:45.772000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:45.780308 systemd-logind[1209]: New session 21 of user core. May 16 00:53:45.781108 systemd[1]: Started session-21.scope. May 16 00:53:45.782000 audit[5384]: USER_START pid=5384 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.783000 audit[5386]: CRED_ACQ pid=5386 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.909099 sshd[5384]: pam_unix(sshd:session): session closed for user core May 16 00:53:45.908000 audit[5384]: USER_END pid=5384 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.908000 audit[5384]: CRED_DISP pid=5384 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:45.911950 systemd[1]: sshd@20-10.0.0.134:22-10.0.0.1:34392.service: Deactivated successfully. May 16 00:53:45.912700 systemd[1]: session-21.scope: Deactivated successfully. May 16 00:53:45.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.134:22-10.0.0.1:34392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:45.913211 systemd-logind[1209]: Session 21 logged out. Waiting for processes to exit. May 16 00:53:45.913851 systemd-logind[1209]: Removed session 21. May 16 00:53:46.591996 kubelet[1970]: E0516 00:53:46.591897 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:50.913677 systemd[1]: Started sshd@21-10.0.0.134:22-10.0.0.1:34406.service. May 16 00:53:50.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.134:22-10.0.0.1:34406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:50.916865 kernel: kauditd_printk_skb: 7 callbacks suppressed May 16 00:53:50.916945 kernel: audit: type=1130 audit(1747356830.913:1539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.134:22-10.0.0.1:34406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:50.954000 audit[5398]: USER_ACCT pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:50.955015 sshd[5398]: Accepted publickey for core from 10.0.0.1 port 34406 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:50.956297 sshd[5398]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:50.954000 audit[5398]: CRED_ACQ pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:50.960106 kernel: audit: type=1101 audit(1747356830.954:1540): pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:50.960165 kernel: audit: type=1103 audit(1747356830.954:1541): pid=5398 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:50.960189 kernel: audit: type=1006 audit(1747356830.954:1542): pid=5398 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 16 00:53:50.954000 audit[5398]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc29d33c0 a2=3 a3=1 items=0 ppid=1 pid=5398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:50.962279 systemd[1]: Started session-22.scope. May 16 00:53:50.962572 systemd-logind[1209]: New session 22 of user core. May 16 00:53:50.963513 kernel: audit: type=1300 audit(1747356830.954:1542): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc29d33c0 a2=3 a3=1 items=0 ppid=1 pid=5398 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:50.963586 kernel: audit: type=1327 audit(1747356830.954:1542): proctitle=737368643A20636F7265205B707269765D May 16 00:53:50.954000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:50.966000 audit[5398]: USER_START pid=5398 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:50.970000 audit[5400]: CRED_ACQ pid=5400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:50.971751 kernel: audit: type=1105 audit(1747356830.966:1543): pid=5398 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:50.975758 kernel: audit: type=1103 audit(1747356830.970:1544): pid=5400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:51.108567 sshd[5398]: pam_unix(sshd:session): session closed for user core May 16 00:53:51.114285 kernel: audit: type=1106 audit(1747356831.108:1545): pid=5398 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:51.114383 kernel: audit: type=1104 audit(1747356831.108:1546): pid=5398 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:51.108000 audit[5398]: USER_END pid=5398 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:51.108000 audit[5398]: CRED_DISP pid=5398 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:51.111072 systemd[1]: sshd@21-10.0.0.134:22-10.0.0.1:34406.service: Deactivated successfully. May 16 00:53:51.111842 systemd[1]: session-22.scope: Deactivated successfully. May 16 00:53:51.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.134:22-10.0.0.1:34406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:51.114723 systemd-logind[1209]: Session 22 logged out. Waiting for processes to exit. May 16 00:53:51.115807 systemd-logind[1209]: Removed session 22. May 16 00:53:54.592071 env[1219]: time="2025-05-16T00:53:54.592028854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 16 00:53:54.757405 env[1219]: time="2025-05-16T00:53:54.757325639Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 16 00:53:54.758406 env[1219]: time="2025-05-16T00:53:54.758359633Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 16 00:53:54.758650 kubelet[1970]: E0516 00:53:54.758603 1970 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:53:54.758910 kubelet[1970]: E0516 00:53:54.758665 1970 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 16 00:53:54.758910 kubelet[1970]: E0516 00:53:54.758838 1970 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-x8g9s,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-8jmjf_calico-system(c1af5719-afc6-4505-975b-6308449f6dc4): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 16 00:53:54.760302 kubelet[1970]: E0516 00:53:54.760240 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-8jmjf" podUID="c1af5719-afc6-4505-975b-6308449f6dc4" May 16 00:53:55.591305 kubelet[1970]: E0516 00:53:55.591239 1970 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 16 00:53:55.592617 kubelet[1970]: E0516 00:53:55.592551 1970 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-79849f5dcc-pm8bq" podUID="4ab3eb70-a520-44d7-b50c-85edec9d15d0" May 16 00:53:56.113361 systemd[1]: Started sshd@22-10.0.0.134:22-10.0.0.1:53822.service. May 16 00:53:56.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.134:22-10.0.0.1:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:56.117170 kernel: kauditd_printk_skb: 1 callbacks suppressed May 16 00:53:56.117265 kernel: audit: type=1130 audit(1747356836.112:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.134:22-10.0.0.1:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 16 00:53:56.156000 audit[5413]: USER_ACCT pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.157072 sshd[5413]: Accepted publickey for core from 10.0.0.1 port 53822 ssh2: RSA SHA256:czXyODm5lEdSCdxgc4UKYE1H3sjGZqNxHBxH/SPqyp4 May 16 00:53:56.158538 sshd[5413]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 16 00:53:56.157000 audit[5413]: CRED_ACQ pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.161573 kernel: audit: type=1101 audit(1747356836.156:1549): pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.161637 kernel: audit: type=1103 audit(1747356836.157:1550): pid=5413 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.161660 kernel: audit: type=1006 audit(1747356836.157:1551): pid=5413 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 16 00:53:56.163082 kernel: audit: type=1300 audit(1747356836.157:1551): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc7316f0 a2=3 a3=1 items=0 ppid=1 pid=5413 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:56.157000 audit[5413]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc7316f0 a2=3 a3=1 items=0 ppid=1 pid=5413 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 16 00:53:56.164843 systemd-logind[1209]: New session 23 of user core. May 16 00:53:56.165269 systemd[1]: Started session-23.scope. May 16 00:53:56.165923 kernel: audit: type=1327 audit(1747356836.157:1551): proctitle=737368643A20636F7265205B707269765D May 16 00:53:56.157000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 16 00:53:56.168000 audit[5413]: USER_START pid=5413 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.169000 audit[5415]: CRED_ACQ pid=5415 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.174163 kernel: audit: type=1105 audit(1747356836.168:1552): pid=5413 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.174227 kernel: audit: type=1103 audit(1747356836.169:1553): pid=5415 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.339497 sshd[5413]: pam_unix(sshd:session): session closed for user core May 16 00:53:56.339000 audit[5413]: USER_END pid=5413 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.342000 systemd[1]: sshd@22-10.0.0.134:22-10.0.0.1:53822.service: Deactivated successfully. May 16 00:53:56.342887 systemd[1]: session-23.scope: Deactivated successfully. May 16 00:53:56.339000 audit[5413]: CRED_DISP pid=5413 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.343531 systemd-logind[1209]: Session 23 logged out. Waiting for processes to exit. May 16 00:53:56.344444 systemd-logind[1209]: Removed session 23. May 16 00:53:56.345377 kernel: audit: type=1106 audit(1747356836.339:1554): pid=5413 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.345508 kernel: audit: type=1104 audit(1747356836.339:1555): pid=5413 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 16 00:53:56.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.134:22-10.0.0.1:53822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'