May 17 00:32:31.863112 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:32:31.863139 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:32:31.863150 kernel: BIOS-provided physical RAM map: May 17 00:32:31.863157 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 17 00:32:31.863164 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 17 00:32:31.863184 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 17 00:32:31.863194 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 17 00:32:31.863202 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 17 00:32:31.863211 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 17 00:32:31.863218 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 17 00:32:31.863225 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 17 00:32:31.863232 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 17 00:32:31.863239 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 17 00:32:31.863247 kernel: NX (Execute Disable) protection: active May 17 00:32:31.863257 kernel: SMBIOS 2.8 present. May 17 00:32:31.863265 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 17 00:32:31.863271 kernel: Hypervisor detected: KVM May 17 00:32:31.863276 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:32:31.863283 kernel: kvm-clock: cpu 0, msr 6819a001, primary cpu clock May 17 00:32:31.863291 kernel: kvm-clock: using sched offset of 2443836809 cycles May 17 00:32:31.863300 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:32:31.863308 kernel: tsc: Detected 2794.748 MHz processor May 17 00:32:31.863316 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:32:31.863327 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:32:31.863335 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 17 00:32:31.863343 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:32:31.863351 kernel: Using GB pages for direct mapping May 17 00:32:31.863359 kernel: ACPI: Early table checksum verification disabled May 17 00:32:31.863367 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 17 00:32:31.863375 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:31.863383 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:31.863391 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:31.863404 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 17 00:32:31.863415 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:31.863423 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:31.863431 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:31.863439 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:31.863447 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 17 00:32:31.863454 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 17 00:32:31.863462 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 17 00:32:31.863475 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 17 00:32:31.863483 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 17 00:32:31.863491 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 17 00:32:31.863500 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 17 00:32:31.863508 kernel: No NUMA configuration found May 17 00:32:31.863516 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 17 00:32:31.863535 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 17 00:32:31.863544 kernel: Zone ranges: May 17 00:32:31.863552 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:32:31.863560 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 17 00:32:31.863568 kernel: Normal empty May 17 00:32:31.863577 kernel: Movable zone start for each node May 17 00:32:31.863585 kernel: Early memory node ranges May 17 00:32:31.863594 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 17 00:32:31.863602 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 17 00:32:31.863610 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 17 00:32:31.863621 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:32:31.863629 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 17 00:32:31.863637 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 17 00:32:31.863644 kernel: ACPI: PM-Timer IO Port: 0x608 May 17 00:32:31.863650 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:32:31.863657 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:32:31.863663 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 00:32:31.863670 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:32:31.863676 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:32:31.863684 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:32:31.863690 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:32:31.863697 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:32:31.863703 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:32:31.863709 kernel: TSC deadline timer available May 17 00:32:31.863716 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 17 00:32:31.863722 kernel: kvm-guest: KVM setup pv remote TLB flush May 17 00:32:31.863728 kernel: kvm-guest: setup PV sched yield May 17 00:32:31.863735 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 17 00:32:31.863742 kernel: Booting paravirtualized kernel on KVM May 17 00:32:31.863749 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:32:31.863756 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 17 00:32:31.863762 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 17 00:32:31.863768 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 17 00:32:31.863775 kernel: pcpu-alloc: [0] 0 1 2 3 May 17 00:32:31.863781 kernel: kvm-guest: setup async PF for cpu 0 May 17 00:32:31.863787 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 17 00:32:31.863794 kernel: kvm-guest: PV spinlocks enabled May 17 00:32:31.863801 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:32:31.863808 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 17 00:32:31.863814 kernel: Policy zone: DMA32 May 17 00:32:31.863821 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:32:31.863828 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:32:31.863835 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:32:31.863842 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:32:31.863848 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:32:31.863856 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) May 17 00:32:31.863863 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 17 00:32:31.863870 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:32:31.863876 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:32:31.863882 kernel: rcu: Hierarchical RCU implementation. May 17 00:32:31.863889 kernel: rcu: RCU event tracing is enabled. May 17 00:32:31.863896 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 17 00:32:31.863903 kernel: Rude variant of Tasks RCU enabled. May 17 00:32:31.863909 kernel: Tracing variant of Tasks RCU enabled. May 17 00:32:31.863916 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:32:31.863923 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 17 00:32:31.863930 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 17 00:32:31.863936 kernel: random: crng init done May 17 00:32:31.863942 kernel: Console: colour VGA+ 80x25 May 17 00:32:31.863949 kernel: printk: console [ttyS0] enabled May 17 00:32:31.863955 kernel: ACPI: Core revision 20210730 May 17 00:32:31.863962 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 17 00:32:31.863968 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:32:31.863975 kernel: x2apic enabled May 17 00:32:31.863982 kernel: Switched APIC routing to physical x2apic. May 17 00:32:31.863988 kernel: kvm-guest: setup PV IPIs May 17 00:32:31.863995 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:32:31.864001 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 17 00:32:31.864008 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 17 00:32:31.864014 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 17 00:32:31.864021 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 17 00:32:31.864027 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 17 00:32:31.864057 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:32:31.864064 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:32:31.864071 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:32:31.864079 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 17 00:32:31.864086 kernel: RETBleed: Mitigation: untrained return thunk May 17 00:32:31.864093 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:32:31.864100 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:32:31.864106 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:32:31.864113 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:32:31.864121 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:32:31.864128 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:32:31.864135 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:32:31.864142 kernel: Freeing SMP alternatives memory: 32K May 17 00:32:31.864149 kernel: pid_max: default: 32768 minimum: 301 May 17 00:32:31.864155 kernel: LSM: Security Framework initializing May 17 00:32:31.864162 kernel: SELinux: Initializing. May 17 00:32:31.864169 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:32:31.864188 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:32:31.864195 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 17 00:32:31.864202 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 17 00:32:31.864209 kernel: ... version: 0 May 17 00:32:31.864216 kernel: ... bit width: 48 May 17 00:32:31.864222 kernel: ... generic registers: 6 May 17 00:32:31.864229 kernel: ... value mask: 0000ffffffffffff May 17 00:32:31.864236 kernel: ... max period: 00007fffffffffff May 17 00:32:31.864243 kernel: ... fixed-purpose events: 0 May 17 00:32:31.864251 kernel: ... event mask: 000000000000003f May 17 00:32:31.864257 kernel: signal: max sigframe size: 1776 May 17 00:32:31.864264 kernel: rcu: Hierarchical SRCU implementation. May 17 00:32:31.864271 kernel: smp: Bringing up secondary CPUs ... May 17 00:32:31.864278 kernel: x86: Booting SMP configuration: May 17 00:32:31.864284 kernel: .... node #0, CPUs: #1 May 17 00:32:31.864291 kernel: kvm-clock: cpu 1, msr 6819a041, secondary cpu clock May 17 00:32:31.864298 kernel: kvm-guest: setup async PF for cpu 1 May 17 00:32:31.864304 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 17 00:32:31.864312 kernel: #2 May 17 00:32:31.864319 kernel: kvm-clock: cpu 2, msr 6819a081, secondary cpu clock May 17 00:32:31.864326 kernel: kvm-guest: setup async PF for cpu 2 May 17 00:32:31.864333 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 17 00:32:31.864339 kernel: #3 May 17 00:32:31.864346 kernel: kvm-clock: cpu 3, msr 6819a0c1, secondary cpu clock May 17 00:32:31.864353 kernel: kvm-guest: setup async PF for cpu 3 May 17 00:32:31.864359 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 17 00:32:31.864367 kernel: smp: Brought up 1 node, 4 CPUs May 17 00:32:31.864376 kernel: smpboot: Max logical packages: 1 May 17 00:32:31.864389 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 17 00:32:31.864403 kernel: devtmpfs: initialized May 17 00:32:31.864413 kernel: x86/mm: Memory block size: 128MB May 17 00:32:31.864422 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:32:31.864432 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 17 00:32:31.864441 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:32:31.864450 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:32:31.864458 kernel: audit: initializing netlink subsys (disabled) May 17 00:32:31.864465 kernel: audit: type=2000 audit(1747441951.329:1): state=initialized audit_enabled=0 res=1 May 17 00:32:31.864475 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:32:31.864482 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:32:31.864488 kernel: cpuidle: using governor menu May 17 00:32:31.864495 kernel: ACPI: bus type PCI registered May 17 00:32:31.864502 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:32:31.864509 kernel: dca service started, version 1.12.1 May 17 00:32:31.864515 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 17 00:32:31.864522 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 17 00:32:31.864537 kernel: PCI: Using configuration type 1 for base access May 17 00:32:31.864546 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:32:31.864553 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:32:31.864560 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:32:31.864567 kernel: ACPI: Added _OSI(Module Device) May 17 00:32:31.864573 kernel: ACPI: Added _OSI(Processor Device) May 17 00:32:31.864581 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:32:31.864588 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:32:31.864594 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:32:31.864601 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:32:31.864609 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:32:31.864616 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:32:31.864622 kernel: ACPI: Interpreter enabled May 17 00:32:31.864629 kernel: ACPI: PM: (supports S0 S3 S5) May 17 00:32:31.864636 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:32:31.864643 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:32:31.864649 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 17 00:32:31.864656 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:32:31.864784 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 17 00:32:31.864862 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 17 00:32:31.864929 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 17 00:32:31.864938 kernel: PCI host bridge to bus 0000:00 May 17 00:32:31.865021 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:32:31.865083 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:32:31.865143 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:32:31.865228 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 17 00:32:31.865288 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 17 00:32:31.865345 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 17 00:32:31.865419 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:32:31.865514 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 17 00:32:31.865634 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 17 00:32:31.865709 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 17 00:32:31.865777 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 17 00:32:31.865885 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 17 00:32:31.865970 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:32:31.866048 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 17 00:32:31.866122 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 17 00:32:31.866208 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 17 00:32:31.866290 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 17 00:32:31.866563 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 17 00:32:31.866639 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 17 00:32:31.866707 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 17 00:32:31.866775 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 17 00:32:31.866854 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:32:31.866922 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 17 00:32:31.867004 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 17 00:32:31.867078 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 17 00:32:31.867146 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 17 00:32:31.867242 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 17 00:32:31.867312 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 17 00:32:31.867386 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 17 00:32:31.867453 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 17 00:32:31.867533 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 17 00:32:31.867628 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 17 00:32:31.867698 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 17 00:32:31.867707 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:32:31.867714 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:32:31.867721 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:32:31.867728 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:32:31.867737 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 17 00:32:31.867744 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 17 00:32:31.867751 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 17 00:32:31.867758 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 17 00:32:31.867765 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 17 00:32:31.867771 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 17 00:32:31.867778 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 17 00:32:31.867785 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 17 00:32:31.867792 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 17 00:32:31.867799 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 17 00:32:31.867806 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 17 00:32:31.867813 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 17 00:32:31.867820 kernel: iommu: Default domain type: Translated May 17 00:32:31.867827 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:32:31.867893 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 17 00:32:31.867960 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:32:31.868024 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 17 00:32:31.868033 kernel: vgaarb: loaded May 17 00:32:31.868042 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:32:31.868049 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:32:31.868056 kernel: PTP clock support registered May 17 00:32:31.868063 kernel: PCI: Using ACPI for IRQ routing May 17 00:32:31.868070 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:32:31.868076 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 17 00:32:31.868084 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 17 00:32:31.868090 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 17 00:32:31.868097 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 17 00:32:31.868105 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:32:31.868112 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:32:31.868119 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:32:31.868126 kernel: pnp: PnP ACPI init May 17 00:32:31.868229 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 17 00:32:31.868240 kernel: pnp: PnP ACPI: found 6 devices May 17 00:32:31.868247 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:32:31.868254 kernel: NET: Registered PF_INET protocol family May 17 00:32:31.868263 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:32:31.868270 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 00:32:31.868277 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:32:31.868284 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:32:31.868290 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 00:32:31.868297 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 00:32:31.868304 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:32:31.868311 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:32:31.868318 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:32:31.868326 kernel: NET: Registered PF_XDP protocol family May 17 00:32:31.868387 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:32:31.868458 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:32:31.868550 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:32:31.868610 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 17 00:32:31.868666 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 17 00:32:31.868722 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 17 00:32:31.868731 kernel: PCI: CLS 0 bytes, default 64 May 17 00:32:31.868742 kernel: Initialise system trusted keyrings May 17 00:32:31.868748 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 00:32:31.868755 kernel: Key type asymmetric registered May 17 00:32:31.868762 kernel: Asymmetric key parser 'x509' registered May 17 00:32:31.868769 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:32:31.868775 kernel: io scheduler mq-deadline registered May 17 00:32:31.868782 kernel: io scheduler kyber registered May 17 00:32:31.868789 kernel: io scheduler bfq registered May 17 00:32:31.868796 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:32:31.868804 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 17 00:32:31.868812 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 17 00:32:31.868818 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 17 00:32:31.868825 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:32:31.868832 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:32:31.868839 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:32:31.868846 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:32:31.868853 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:32:31.868922 kernel: rtc_cmos 00:04: RTC can wake from S4 May 17 00:32:31.868934 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:32:31.868996 kernel: rtc_cmos 00:04: registered as rtc0 May 17 00:32:31.869058 kernel: rtc_cmos 00:04: setting system clock to 2025-05-17T00:32:31 UTC (1747441951) May 17 00:32:31.869119 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 17 00:32:31.869128 kernel: NET: Registered PF_INET6 protocol family May 17 00:32:31.869136 kernel: Segment Routing with IPv6 May 17 00:32:31.869142 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:32:31.869149 kernel: NET: Registered PF_PACKET protocol family May 17 00:32:31.869159 kernel: Key type dns_resolver registered May 17 00:32:31.869165 kernel: IPI shorthand broadcast: enabled May 17 00:32:31.869172 kernel: sched_clock: Marking stable (425704771, 110772280)->(585058963, -48581912) May 17 00:32:31.869191 kernel: registered taskstats version 1 May 17 00:32:31.869197 kernel: Loading compiled-in X.509 certificates May 17 00:32:31.869205 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:32:31.869211 kernel: Key type .fscrypt registered May 17 00:32:31.869218 kernel: Key type fscrypt-provisioning registered May 17 00:32:31.869225 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:32:31.869233 kernel: ima: Allocated hash algorithm: sha1 May 17 00:32:31.869240 kernel: ima: No architecture policies found May 17 00:32:31.869247 kernel: clk: Disabling unused clocks May 17 00:32:31.869253 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:32:31.869260 kernel: Write protecting the kernel read-only data: 28672k May 17 00:32:31.869267 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:32:31.869274 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:32:31.869281 kernel: Run /init as init process May 17 00:32:31.869287 kernel: with arguments: May 17 00:32:31.869295 kernel: /init May 17 00:32:31.869302 kernel: with environment: May 17 00:32:31.869309 kernel: HOME=/ May 17 00:32:31.869315 kernel: TERM=linux May 17 00:32:31.869322 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:32:31.869331 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:32:31.869340 systemd[1]: Detected virtualization kvm. May 17 00:32:31.869348 systemd[1]: Detected architecture x86-64. May 17 00:32:31.869357 systemd[1]: Running in initrd. May 17 00:32:31.869364 systemd[1]: No hostname configured, using default hostname. May 17 00:32:31.869371 systemd[1]: Hostname set to . May 17 00:32:31.869379 systemd[1]: Initializing machine ID from VM UUID. May 17 00:32:31.869386 systemd[1]: Queued start job for default target initrd.target. May 17 00:32:31.869393 systemd[1]: Started systemd-ask-password-console.path. May 17 00:32:31.869400 systemd[1]: Reached target cryptsetup.target. May 17 00:32:31.869407 systemd[1]: Reached target paths.target. May 17 00:32:31.869416 systemd[1]: Reached target slices.target. May 17 00:32:31.869429 systemd[1]: Reached target swap.target. May 17 00:32:31.869438 systemd[1]: Reached target timers.target. May 17 00:32:31.869446 systemd[1]: Listening on iscsid.socket. May 17 00:32:31.869453 systemd[1]: Listening on iscsiuio.socket. May 17 00:32:31.869462 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:32:31.869471 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:32:31.869480 systemd[1]: Listening on systemd-journald.socket. May 17 00:32:31.869488 systemd[1]: Listening on systemd-networkd.socket. May 17 00:32:31.869498 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:32:31.869505 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:32:31.869513 systemd[1]: Reached target sockets.target. May 17 00:32:31.869520 systemd[1]: Starting kmod-static-nodes.service... May 17 00:32:31.869534 systemd[1]: Finished network-cleanup.service. May 17 00:32:31.869543 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:32:31.869551 systemd[1]: Starting systemd-journald.service... May 17 00:32:31.869559 systemd[1]: Starting systemd-modules-load.service... May 17 00:32:31.869566 systemd[1]: Starting systemd-resolved.service... May 17 00:32:31.869575 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:32:31.869582 systemd[1]: Finished kmod-static-nodes.service. May 17 00:32:31.869589 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:32:31.869597 kernel: audit: type=1130 audit(1747441951.861:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.869605 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:32:31.869618 systemd-journald[198]: Journal started May 17 00:32:31.869664 systemd-journald[198]: Runtime Journal (/run/log/journal/ff96af2c4a094c5fa147b7dc85671d9b) is 6.0M, max 48.5M, 42.5M free. May 17 00:32:31.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.871197 systemd[1]: Started systemd-journald.service. May 17 00:32:31.872040 systemd-modules-load[199]: Inserted module 'overlay' May 17 00:32:31.885439 systemd-resolved[200]: Positive Trust Anchors: May 17 00:32:31.885456 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:32:31.885483 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:32:31.903199 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:32:31.887653 systemd-resolved[200]: Defaulting to hostname 'linux'. May 17 00:32:31.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.912279 systemd[1]: Started systemd-resolved.service. May 17 00:32:31.919813 kernel: audit: type=1130 audit(1747441951.911:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.919830 kernel: audit: type=1130 audit(1747441951.914:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.915130 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:32:31.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.921910 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:32:31.927171 kernel: audit: type=1130 audit(1747441951.921:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.927198 kernel: Bridge firewalling registered May 17 00:32:31.927208 kernel: audit: type=1130 audit(1747441951.926:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.925356 systemd-modules-load[199]: Inserted module 'br_netfilter' May 17 00:32:31.927312 systemd[1]: Reached target nss-lookup.target. May 17 00:32:31.933332 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:32:31.945380 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:32:31.951261 kernel: SCSI subsystem initialized May 17 00:32:31.951281 kernel: audit: type=1130 audit(1747441951.946:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.947447 systemd[1]: Starting dracut-cmdline.service... May 17 00:32:31.957460 dracut-cmdline[216]: dracut-dracut-053 May 17 00:32:31.960229 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:32:31.960245 kernel: device-mapper: uevent: version 1.0.3 May 17 00:32:31.960253 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:32:31.960697 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:32:31.966165 systemd-modules-load[199]: Inserted module 'dm_multipath' May 17 00:32:31.966878 systemd[1]: Finished systemd-modules-load.service. May 17 00:32:31.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.969852 systemd[1]: Starting systemd-sysctl.service... May 17 00:32:31.973670 kernel: audit: type=1130 audit(1747441951.968:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.978426 systemd[1]: Finished systemd-sysctl.service. May 17 00:32:31.982910 kernel: audit: type=1130 audit(1747441951.978:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:31.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:32.022198 kernel: Loading iSCSI transport class v2.0-870. May 17 00:32:32.039196 kernel: iscsi: registered transport (tcp) May 17 00:32:32.060198 kernel: iscsi: registered transport (qla4xxx) May 17 00:32:32.060226 kernel: QLogic iSCSI HBA Driver May 17 00:32:32.089170 systemd[1]: Finished dracut-cmdline.service. May 17 00:32:32.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:32.091775 systemd[1]: Starting dracut-pre-udev.service... May 17 00:32:32.095595 kernel: audit: type=1130 audit(1747441952.090:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:32.137200 kernel: raid6: avx2x4 gen() 29856 MB/s May 17 00:32:32.154194 kernel: raid6: avx2x4 xor() 7939 MB/s May 17 00:32:32.171194 kernel: raid6: avx2x2 gen() 32358 MB/s May 17 00:32:32.188194 kernel: raid6: avx2x2 xor() 19145 MB/s May 17 00:32:32.205203 kernel: raid6: avx2x1 gen() 26386 MB/s May 17 00:32:32.222223 kernel: raid6: avx2x1 xor() 15039 MB/s May 17 00:32:32.239227 kernel: raid6: sse2x4 gen() 14712 MB/s May 17 00:32:32.256205 kernel: raid6: sse2x4 xor() 7727 MB/s May 17 00:32:32.273212 kernel: raid6: sse2x2 gen() 15883 MB/s May 17 00:32:32.290210 kernel: raid6: sse2x2 xor() 9627 MB/s May 17 00:32:32.307212 kernel: raid6: sse2x1 gen() 12238 MB/s May 17 00:32:32.324530 kernel: raid6: sse2x1 xor() 7756 MB/s May 17 00:32:32.324579 kernel: raid6: using algorithm avx2x2 gen() 32358 MB/s May 17 00:32:32.324589 kernel: raid6: .... xor() 19145 MB/s, rmw enabled May 17 00:32:32.325211 kernel: raid6: using avx2x2 recovery algorithm May 17 00:32:32.340210 kernel: xor: automatically using best checksumming function avx May 17 00:32:32.435211 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:32:32.443242 systemd[1]: Finished dracut-pre-udev.service. May 17 00:32:32.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:32.444000 audit: BPF prog-id=7 op=LOAD May 17 00:32:32.444000 audit: BPF prog-id=8 op=LOAD May 17 00:32:32.445327 systemd[1]: Starting systemd-udevd.service... May 17 00:32:32.457081 systemd-udevd[400]: Using default interface naming scheme 'v252'. May 17 00:32:32.460857 systemd[1]: Started systemd-udevd.service. May 17 00:32:32.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:32.461459 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:32:32.471995 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation May 17 00:32:32.494760 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:32:32.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:32.496500 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:32:32.529988 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:32:32.529000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:32.558733 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 17 00:32:32.565113 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:32:32.565126 kernel: GPT:9289727 != 19775487 May 17 00:32:32.565134 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:32:32.565143 kernel: GPT:9289727 != 19775487 May 17 00:32:32.565151 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:32:32.565159 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:32.567210 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:32:32.570193 kernel: libata version 3.00 loaded. May 17 00:32:32.578569 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:32:32.578590 kernel: AES CTR mode by8 optimization enabled May 17 00:32:32.578600 kernel: ahci 0000:00:1f.2: version 3.0 May 17 00:32:32.588133 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 17 00:32:32.588146 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 17 00:32:32.588269 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 17 00:32:32.588348 kernel: scsi host0: ahci May 17 00:32:32.588434 kernel: scsi host1: ahci May 17 00:32:32.588540 kernel: scsi host2: ahci May 17 00:32:32.588617 kernel: scsi host3: ahci May 17 00:32:32.588694 kernel: scsi host4: ahci May 17 00:32:32.588770 kernel: scsi host5: ahci May 17 00:32:32.588850 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 17 00:32:32.588860 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 17 00:32:32.588868 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 17 00:32:32.588877 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 17 00:32:32.588885 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 17 00:32:32.588894 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 17 00:32:32.601194 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (459) May 17 00:32:32.604198 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:32:32.636085 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:32:32.641539 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:32:32.644660 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:32:32.647610 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:32:32.648247 systemd[1]: Starting disk-uuid.service... May 17 00:32:32.657872 disk-uuid[531]: Primary Header is updated. May 17 00:32:32.657872 disk-uuid[531]: Secondary Entries is updated. May 17 00:32:32.657872 disk-uuid[531]: Secondary Header is updated. May 17 00:32:32.661255 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:32.895617 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 17 00:32:32.895686 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 17 00:32:32.895696 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 17 00:32:32.897445 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 17 00:32:32.898207 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 17 00:32:32.899203 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 17 00:32:32.900208 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 17 00:32:32.901619 kernel: ata3.00: applying bridge limits May 17 00:32:32.901633 kernel: ata3.00: configured for UDMA/100 May 17 00:32:32.902201 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 17 00:32:32.936202 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 17 00:32:32.952653 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:32:32.952666 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 17 00:32:33.667692 disk-uuid[532]: The operation has completed successfully. May 17 00:32:33.668827 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:33.691056 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:32:33.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.691151 systemd[1]: Finished disk-uuid.service. May 17 00:32:33.701395 systemd[1]: Starting verity-setup.service... May 17 00:32:33.714194 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 17 00:32:33.732167 systemd[1]: Found device dev-mapper-usr.device. May 17 00:32:33.734348 systemd[1]: Mounting sysusr-usr.mount... May 17 00:32:33.736021 systemd[1]: Finished verity-setup.service. May 17 00:32:33.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.795212 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:32:33.795750 systemd[1]: Mounted sysusr-usr.mount. May 17 00:32:33.796804 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:32:33.797426 systemd[1]: Starting ignition-setup.service... May 17 00:32:33.798836 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:32:33.807436 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:32:33.807523 kernel: BTRFS info (device vda6): using free space tree May 17 00:32:33.807541 kernel: BTRFS info (device vda6): has skinny extents May 17 00:32:33.816914 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:32:33.830735 systemd[1]: Finished ignition-setup.service. May 17 00:32:33.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.832861 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:32:33.865490 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:32:33.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.867000 audit: BPF prog-id=9 op=LOAD May 17 00:32:33.868019 systemd[1]: Starting systemd-networkd.service... May 17 00:32:33.874926 ignition[665]: Ignition 2.14.0 May 17 00:32:33.874941 ignition[665]: Stage: fetch-offline May 17 00:32:33.875027 ignition[665]: no configs at "/usr/lib/ignition/base.d" May 17 00:32:33.875038 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:33.875149 ignition[665]: parsed url from cmdline: "" May 17 00:32:33.875153 ignition[665]: no config URL provided May 17 00:32:33.875159 ignition[665]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:32:33.875169 ignition[665]: no config at "/usr/lib/ignition/user.ign" May 17 00:32:33.875204 ignition[665]: op(1): [started] loading QEMU firmware config module May 17 00:32:33.875210 ignition[665]: op(1): executing: "modprobe" "qemu_fw_cfg" May 17 00:32:33.878889 ignition[665]: op(1): [finished] loading QEMU firmware config module May 17 00:32:33.899083 systemd-networkd[729]: lo: Link UP May 17 00:32:33.899092 systemd-networkd[729]: lo: Gained carrier May 17 00:32:33.900168 systemd-networkd[729]: Enumeration completed May 17 00:32:33.901018 systemd[1]: Started systemd-networkd.service. May 17 00:32:33.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.902438 systemd-networkd[729]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:32:33.902898 systemd[1]: Reached target network.target. May 17 00:32:33.903454 systemd-networkd[729]: eth0: Link UP May 17 00:32:33.903458 systemd-networkd[729]: eth0: Gained carrier May 17 00:32:33.909706 systemd[1]: Starting iscsiuio.service... May 17 00:32:33.913155 systemd[1]: Started iscsiuio.service. May 17 00:32:33.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.915458 systemd[1]: Starting iscsid.service... May 17 00:32:33.917732 iscsid[735]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:32:33.917732 iscsid[735]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:32:33.917732 iscsid[735]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:32:33.917732 iscsid[735]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:32:33.917732 iscsid[735]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:32:33.917732 iscsid[735]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:32:33.919333 systemd[1]: Started iscsid.service. May 17 00:32:33.930000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.931488 systemd[1]: Starting dracut-initqueue.service... May 17 00:32:33.942851 systemd[1]: Finished dracut-initqueue.service. May 17 00:32:33.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.944995 systemd[1]: Reached target remote-fs-pre.target. May 17 00:32:33.945923 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:32:33.947261 ignition[665]: parsing config with SHA512: 77c11b57c3c2b914c4a43244243e49830ca89e833f0a6e09ad8ec6327c4b717f6b34222b8373d852e42757134bbd5ff9efef9799e9971870cbab5cebc4c00597 May 17 00:32:33.947743 systemd[1]: Reached target remote-fs.target. May 17 00:32:33.948709 systemd[1]: Starting dracut-pre-mount.service... May 17 00:32:33.958504 unknown[665]: fetched base config from "system" May 17 00:32:33.958864 ignition[665]: fetch-offline: fetch-offline passed May 17 00:32:33.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.958513 unknown[665]: fetched user config from "qemu" May 17 00:32:33.958904 ignition[665]: Ignition finished successfully May 17 00:32:33.960080 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:32:33.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.962219 systemd[1]: Finished dracut-pre-mount.service. May 17 00:32:33.962308 systemd-networkd[729]: eth0: DHCPv4 address 10.0.0.66/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 17 00:32:33.965296 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 17 00:32:33.969563 systemd[1]: Starting ignition-kargs.service... May 17 00:32:33.979763 ignition[749]: Ignition 2.14.0 May 17 00:32:33.979777 ignition[749]: Stage: kargs May 17 00:32:33.979892 ignition[749]: no configs at "/usr/lib/ignition/base.d" May 17 00:32:33.979906 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:33.981206 ignition[749]: kargs: kargs passed May 17 00:32:33.981254 ignition[749]: Ignition finished successfully May 17 00:32:33.985025 systemd[1]: Finished ignition-kargs.service. May 17 00:32:33.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.987102 systemd[1]: Starting ignition-disks.service... May 17 00:32:33.993117 ignition[755]: Ignition 2.14.0 May 17 00:32:33.993126 ignition[755]: Stage: disks May 17 00:32:33.993225 ignition[755]: no configs at "/usr/lib/ignition/base.d" May 17 00:32:33.993235 ignition[755]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:33.994245 ignition[755]: disks: disks passed May 17 00:32:33.994277 ignition[755]: Ignition finished successfully May 17 00:32:33.997899 systemd[1]: Finished ignition-disks.service. May 17 00:32:33.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:33.999405 systemd[1]: Reached target initrd-root-device.target. May 17 00:32:34.000308 systemd[1]: Reached target local-fs-pre.target. May 17 00:32:34.001913 systemd[1]: Reached target local-fs.target. May 17 00:32:34.002711 systemd[1]: Reached target sysinit.target. May 17 00:32:34.002751 systemd[1]: Reached target basic.target. May 17 00:32:34.003661 systemd[1]: Starting systemd-fsck-root.service... May 17 00:32:34.013396 systemd-fsck[763]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:32:34.018773 systemd[1]: Finished systemd-fsck-root.service. May 17 00:32:34.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:34.021777 systemd[1]: Mounting sysroot.mount... May 17 00:32:34.029917 systemd[1]: Mounted sysroot.mount. May 17 00:32:34.031406 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:32:34.031456 systemd[1]: Reached target initrd-root-fs.target. May 17 00:32:34.034009 systemd[1]: Mounting sysroot-usr.mount... May 17 00:32:34.035854 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:32:34.035900 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:32:34.037332 systemd[1]: Reached target ignition-diskful.target. May 17 00:32:34.041760 systemd[1]: Mounted sysroot-usr.mount. May 17 00:32:34.043914 systemd[1]: Starting initrd-setup-root.service... May 17 00:32:34.047988 initrd-setup-root[773]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:32:34.052248 initrd-setup-root[781]: cut: /sysroot/etc/group: No such file or directory May 17 00:32:34.055996 initrd-setup-root[789]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:32:34.059722 initrd-setup-root[797]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:32:34.084999 systemd[1]: Finished initrd-setup-root.service. May 17 00:32:34.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:34.087283 systemd[1]: Starting ignition-mount.service... May 17 00:32:34.089405 systemd[1]: Starting sysroot-boot.service... May 17 00:32:34.092099 bash[814]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:32:34.801190 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:32:34.806086 ignition[816]: INFO : Ignition 2.14.0 May 17 00:32:34.807077 ignition[816]: INFO : Stage: mount May 17 00:32:34.807077 ignition[816]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:32:34.807077 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:34.815825 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (817) May 17 00:32:34.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:34.812551 systemd[1]: Finished ignition-mount.service. May 17 00:32:34.821310 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:32:34.821329 kernel: BTRFS info (device vda6): using free space tree May 17 00:32:34.821341 kernel: BTRFS info (device vda6): has skinny extents May 17 00:32:34.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:34.821382 ignition[816]: INFO : mount: mount passed May 17 00:32:34.821382 ignition[816]: INFO : Ignition finished successfully May 17 00:32:34.817910 systemd[1]: Finished sysroot-boot.service. May 17 00:32:34.822646 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:32:34.824866 systemd[1]: Starting ignition-files.service... May 17 00:32:34.837511 ignition[844]: INFO : Ignition 2.14.0 May 17 00:32:34.837511 ignition[844]: INFO : Stage: files May 17 00:32:34.839569 ignition[844]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:32:34.839569 ignition[844]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:34.839569 ignition[844]: DEBUG : files: compiled without relabeling support, skipping May 17 00:32:34.839569 ignition[844]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:32:34.839569 ignition[844]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:32:34.847827 ignition[844]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:32:34.847827 ignition[844]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:32:34.847827 ignition[844]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:32:34.847827 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:32:34.847827 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.17.3-linux-amd64.tar.gz: attempt #1 May 17 00:32:34.842721 unknown[844]: wrote ssh authorized keys file for user: core May 17 00:32:34.887827 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:32:35.179129 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.17.3-linux-amd64.tar.gz" May 17 00:32:35.181123 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:32:35.183249 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:32:35.184952 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:32:35.185391 systemd-networkd[729]: eth0: Gained IPv6LL May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:32:35.188102 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.33.0-x86-64.raw: attempt #1 May 17 00:32:35.862298 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 17 00:32:36.177278 ignition[844]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.33.0-x86-64.raw" May 17 00:32:36.177278 ignition[844]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 17 00:32:36.181335 ignition[844]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:32:36.213633 ignition[844]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:32:36.215375 ignition[844]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 17 00:32:36.215375 ignition[844]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:32:36.215375 ignition[844]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:32:36.215375 ignition[844]: INFO : files: files passed May 17 00:32:36.215375 ignition[844]: INFO : Ignition finished successfully May 17 00:32:36.223500 systemd[1]: Finished ignition-files.service. May 17 00:32:36.230367 kernel: kauditd_printk_skb: 24 callbacks suppressed May 17 00:32:36.230390 kernel: audit: type=1130 audit(1747441956.224:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.225353 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:32:36.230432 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:32:36.235599 initrd-setup-root-after-ignition[867]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 17 00:32:36.240932 kernel: audit: type=1130 audit(1747441956.235:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.231479 systemd[1]: Starting ignition-quench.service... May 17 00:32:36.248364 kernel: audit: type=1130 audit(1747441956.240:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.248379 kernel: audit: type=1131 audit(1747441956.240:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.248466 initrd-setup-root-after-ignition[870]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:32:36.234233 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:32:36.235803 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:32:36.235882 systemd[1]: Finished ignition-quench.service. May 17 00:32:36.241058 systemd[1]: Reached target ignition-complete.target. May 17 00:32:36.249255 systemd[1]: Starting initrd-parse-etc.service... May 17 00:32:36.264328 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:32:36.264434 systemd[1]: Finished initrd-parse-etc.service. May 17 00:32:36.273928 kernel: audit: type=1130 audit(1747441956.266:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.273943 kernel: audit: type=1131 audit(1747441956.266:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.266308 systemd[1]: Reached target initrd-fs.target. May 17 00:32:36.273930 systemd[1]: Reached target initrd.target. May 17 00:32:36.274755 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:32:36.275462 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:32:36.287377 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:32:36.292605 kernel: audit: type=1130 audit(1747441956.287:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.288169 systemd[1]: Starting initrd-cleanup.service... May 17 00:32:36.296975 systemd[1]: Stopped target nss-lookup.target. May 17 00:32:36.297915 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:32:36.299542 systemd[1]: Stopped target timers.target. May 17 00:32:36.301143 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:32:36.307283 kernel: audit: type=1131 audit(1747441956.302:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.302000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.301251 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:32:36.302770 systemd[1]: Stopped target initrd.target. May 17 00:32:36.307355 systemd[1]: Stopped target basic.target. May 17 00:32:36.308895 systemd[1]: Stopped target ignition-complete.target. May 17 00:32:36.310502 systemd[1]: Stopped target ignition-diskful.target. May 17 00:32:36.312063 systemd[1]: Stopped target initrd-root-device.target. May 17 00:32:36.313812 systemd[1]: Stopped target remote-fs.target. May 17 00:32:36.315458 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:32:36.317138 systemd[1]: Stopped target sysinit.target. May 17 00:32:36.318667 systemd[1]: Stopped target local-fs.target. May 17 00:32:36.320257 systemd[1]: Stopped target local-fs-pre.target. May 17 00:32:36.321806 systemd[1]: Stopped target swap.target. May 17 00:32:36.329279 kernel: audit: type=1131 audit(1747441956.324:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.323287 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:32:36.323373 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:32:36.335658 kernel: audit: type=1131 audit(1747441956.330:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.324942 systemd[1]: Stopped target cryptsetup.target. May 17 00:32:36.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.329315 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:32:36.329402 systemd[1]: Stopped dracut-initqueue.service. May 17 00:32:36.331167 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:32:36.331261 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:32:36.335771 systemd[1]: Stopped target paths.target. May 17 00:32:36.337256 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:32:36.341217 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:32:36.342673 systemd[1]: Stopped target slices.target. May 17 00:32:36.344496 systemd[1]: Stopped target sockets.target. May 17 00:32:36.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.346148 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:32:36.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.346253 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:32:36.353468 iscsid[735]: iscsid shutting down. May 17 00:32:36.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.347880 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:32:36.359282 ignition[884]: INFO : Ignition 2.14.0 May 17 00:32:36.359282 ignition[884]: INFO : Stage: umount May 17 00:32:36.359282 ignition[884]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:32:36.359282 ignition[884]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:36.359282 ignition[884]: INFO : umount: umount passed May 17 00:32:36.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.347962 systemd[1]: Stopped ignition-files.service. May 17 00:32:36.365739 ignition[884]: INFO : Ignition finished successfully May 17 00:32:36.350133 systemd[1]: Stopping ignition-mount.service... May 17 00:32:36.351577 systemd[1]: Stopping iscsid.service... May 17 00:32:36.353376 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:32:36.353530 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:32:36.355490 systemd[1]: Stopping sysroot-boot.service... May 17 00:32:36.356770 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:32:36.356968 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:32:36.359349 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:32:36.359490 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:32:36.376075 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:32:36.377459 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:32:36.378338 systemd[1]: Stopped iscsid.service. May 17 00:32:36.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.380268 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:32:36.381272 systemd[1]: Stopped ignition-mount.service. May 17 00:32:36.382000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.383088 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:32:36.383948 systemd[1]: Closed iscsid.socket. May 17 00:32:36.385418 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:32:36.385455 systemd[1]: Stopped ignition-disks.service. May 17 00:32:36.387000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.387834 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:32:36.387868 systemd[1]: Stopped ignition-kargs.service. May 17 00:32:36.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.390340 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:32:36.390373 systemd[1]: Stopped ignition-setup.service. May 17 00:32:36.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.392788 systemd[1]: Stopping iscsiuio.service... May 17 00:32:36.394805 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:32:36.396182 systemd[1]: Finished initrd-cleanup.service. May 17 00:32:36.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.397937 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:32:36.398848 systemd[1]: Stopped iscsiuio.service. May 17 00:32:36.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.400958 systemd[1]: Stopped target network.target. May 17 00:32:36.402527 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:32:36.402555 systemd[1]: Closed iscsiuio.socket. May 17 00:32:36.404807 systemd[1]: Stopping systemd-networkd.service... May 17 00:32:36.406541 systemd[1]: Stopping systemd-resolved.service... May 17 00:32:36.411211 systemd-networkd[729]: eth0: DHCPv6 lease lost May 17 00:32:36.412561 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:32:36.412688 systemd[1]: Stopped systemd-networkd.service. May 17 00:32:36.414000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.415886 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:32:36.416918 systemd[1]: Stopped systemd-resolved.service. May 17 00:32:36.417000 audit: BPF prog-id=9 op=UNLOAD May 17 00:32:36.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.419089 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:32:36.419116 systemd[1]: Closed systemd-networkd.socket. May 17 00:32:36.420000 audit: BPF prog-id=6 op=UNLOAD May 17 00:32:36.422287 systemd[1]: Stopping network-cleanup.service... May 17 00:32:36.423886 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:32:36.423924 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:32:36.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.426664 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:32:36.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.426697 systemd[1]: Stopped systemd-sysctl.service. May 17 00:32:36.429359 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:32:36.429403 systemd[1]: Stopped systemd-modules-load.service. May 17 00:32:36.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.432160 systemd[1]: Stopping systemd-udevd.service... May 17 00:32:36.434821 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:32:36.437875 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:32:36.438852 systemd[1]: Stopped network-cleanup.service. May 17 00:32:36.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.440854 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:32:36.441835 systemd[1]: Stopped systemd-udevd.service. May 17 00:32:36.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.443753 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:32:36.443788 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:32:36.446463 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:32:36.446491 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:32:36.448453 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:32:36.448486 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:32:36.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.451577 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:32:36.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.451615 systemd[1]: Stopped dracut-cmdline.service. May 17 00:32:36.454000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.453515 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:32:36.453546 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:32:36.457403 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:32:36.458346 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:32:36.460000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.459207 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:32:36.462148 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:32:36.462234 systemd[1]: Stopped sysroot-boot.service. May 17 00:32:36.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.464846 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:32:36.465909 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:32:36.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.467825 systemd[1]: Reached target initrd-switch-root.target. May 17 00:32:36.469601 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:32:36.469637 systemd[1]: Stopped initrd-setup-root.service. May 17 00:32:36.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:36.472592 systemd[1]: Starting initrd-switch-root.service... May 17 00:32:36.488151 systemd[1]: Switching root. May 17 00:32:36.511875 systemd-journald[198]: Journal stopped May 17 00:32:39.117489 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 17 00:32:39.117554 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:32:39.117579 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:32:39.117596 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:32:39.117610 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:32:39.117624 kernel: SELinux: policy capability open_perms=1 May 17 00:32:39.117637 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:32:39.117657 kernel: SELinux: policy capability always_check_network=0 May 17 00:32:39.117674 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:32:39.117686 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:32:39.117699 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:32:39.117712 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:32:39.118670 systemd[1]: Successfully loaded SELinux policy in 38.487ms. May 17 00:32:39.118700 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.154ms. May 17 00:32:39.118712 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:32:39.118723 systemd[1]: Detected virtualization kvm. May 17 00:32:39.118734 systemd[1]: Detected architecture x86-64. May 17 00:32:39.118744 systemd[1]: Detected first boot. May 17 00:32:39.118754 systemd[1]: Initializing machine ID from VM UUID. May 17 00:32:39.118768 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:32:39.118778 systemd[1]: Populated /etc with preset unit settings. May 17 00:32:39.118789 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:32:39.118800 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:32:39.118811 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:32:39.118830 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:32:39.118846 systemd[1]: Stopped initrd-switch-root.service. May 17 00:32:39.118859 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:32:39.118869 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:32:39.118880 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:32:39.118890 systemd[1]: Created slice system-getty.slice. May 17 00:32:39.118900 systemd[1]: Created slice system-modprobe.slice. May 17 00:32:39.118910 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:32:39.118921 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:32:39.118932 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:32:39.118946 systemd[1]: Created slice user.slice. May 17 00:32:39.118957 systemd[1]: Started systemd-ask-password-console.path. May 17 00:32:39.118967 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:32:39.118977 systemd[1]: Set up automount boot.automount. May 17 00:32:39.118987 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:32:39.118997 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:32:39.119009 systemd[1]: Stopped target initrd-fs.target. May 17 00:32:39.119020 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:32:39.119031 systemd[1]: Reached target integritysetup.target. May 17 00:32:39.119041 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:32:39.119051 systemd[1]: Reached target remote-fs.target. May 17 00:32:39.119062 systemd[1]: Reached target slices.target. May 17 00:32:39.119072 systemd[1]: Reached target swap.target. May 17 00:32:39.119082 systemd[1]: Reached target torcx.target. May 17 00:32:39.119091 systemd[1]: Reached target veritysetup.target. May 17 00:32:39.119101 systemd[1]: Listening on systemd-coredump.socket. May 17 00:32:39.119113 systemd[1]: Listening on systemd-initctl.socket. May 17 00:32:39.119123 systemd[1]: Listening on systemd-networkd.socket. May 17 00:32:39.119134 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:32:39.119144 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:32:39.119154 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:32:39.119165 systemd[1]: Mounting dev-hugepages.mount... May 17 00:32:39.119186 systemd[1]: Mounting dev-mqueue.mount... May 17 00:32:39.119197 systemd[1]: Mounting media.mount... May 17 00:32:39.119207 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:39.119220 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:32:39.119230 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:32:39.119241 systemd[1]: Mounting tmp.mount... May 17 00:32:39.119251 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:32:39.119261 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:39.119271 systemd[1]: Starting kmod-static-nodes.service... May 17 00:32:39.119281 systemd[1]: Starting modprobe@configfs.service... May 17 00:32:39.119291 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:39.119302 systemd[1]: Starting modprobe@drm.service... May 17 00:32:39.119322 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:39.119333 systemd[1]: Starting modprobe@fuse.service... May 17 00:32:39.119343 systemd[1]: Starting modprobe@loop.service... May 17 00:32:39.119354 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:32:39.119365 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:32:39.119375 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:32:39.119385 kernel: loop: module loaded May 17 00:32:39.119395 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:32:39.119406 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:32:39.119417 kernel: fuse: init (API version 7.34) May 17 00:32:39.119426 systemd[1]: Stopped systemd-journald.service. May 17 00:32:39.119436 systemd[1]: Starting systemd-journald.service... May 17 00:32:39.119447 systemd[1]: Starting systemd-modules-load.service... May 17 00:32:39.119458 systemd[1]: Starting systemd-network-generator.service... May 17 00:32:39.119469 systemd[1]: Starting systemd-remount-fs.service... May 17 00:32:39.119479 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:32:39.119488 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:32:39.119498 systemd[1]: Stopped verity-setup.service. May 17 00:32:39.119509 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:39.119522 systemd-journald[999]: Journal started May 17 00:32:39.119561 systemd-journald[999]: Runtime Journal (/run/log/journal/ff96af2c4a094c5fa147b7dc85671d9b) is 6.0M, max 48.5M, 42.5M free. May 17 00:32:36.569000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:32:36.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:32:36.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:32:36.845000 audit: BPF prog-id=10 op=LOAD May 17 00:32:36.845000 audit: BPF prog-id=10 op=UNLOAD May 17 00:32:36.845000 audit: BPF prog-id=11 op=LOAD May 17 00:32:36.845000 audit: BPF prog-id=11 op=UNLOAD May 17 00:32:36.879000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:32:36.879000 audit[918]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:36.879000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:32:36.881000 audit[918]: AVC avc: denied { associate } for pid=918 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:32:36.881000 audit[918]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=901 pid=918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:36.881000 audit: CWD cwd="/" May 17 00:32:36.881000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:36.881000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:36.881000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:32:38.982000 audit: BPF prog-id=12 op=LOAD May 17 00:32:38.982000 audit: BPF prog-id=3 op=UNLOAD May 17 00:32:38.982000 audit: BPF prog-id=13 op=LOAD May 17 00:32:38.983000 audit: BPF prog-id=14 op=LOAD May 17 00:32:38.983000 audit: BPF prog-id=4 op=UNLOAD May 17 00:32:38.983000 audit: BPF prog-id=5 op=UNLOAD May 17 00:32:38.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:38.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:38.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:38.994000 audit: BPF prog-id=12 op=UNLOAD May 17 00:32:39.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.099000 audit: BPF prog-id=15 op=LOAD May 17 00:32:39.099000 audit: BPF prog-id=16 op=LOAD May 17 00:32:39.099000 audit: BPF prog-id=17 op=LOAD May 17 00:32:39.099000 audit: BPF prog-id=13 op=UNLOAD May 17 00:32:39.099000 audit: BPF prog-id=14 op=UNLOAD May 17 00:32:39.116000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:32:39.116000 audit[999]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe8641eb90 a2=4000 a3=7ffe8641ec2c items=0 ppid=1 pid=999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:39.116000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:32:39.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:38.981071 systemd[1]: Queued start job for default target multi-user.target. May 17 00:32:36.877035 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:32:38.981082 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 17 00:32:36.877745 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:32:38.983680 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:32:36.877763 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:32:36.877794 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:32:36.877804 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:32:36.877834 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:32:36.877846 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:32:36.878062 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:32:36.878098 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:32:36.878110 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:32:36.879550 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:32:36.879588 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:32:36.879606 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:32:36.879621 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:32:36.879637 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:32:36.879651 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:32:38.682341 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:38.682590 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:38.682683 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:38.682825 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:38.682869 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:32:38.682920 /usr/lib/systemd/system-generators/torcx-generator[918]: time="2025-05-17T00:32:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:32:39.123207 systemd[1]: Started systemd-journald.service. May 17 00:32:39.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.124601 systemd[1]: Mounted dev-hugepages.mount. May 17 00:32:39.125570 systemd[1]: Mounted dev-mqueue.mount. May 17 00:32:39.126418 systemd[1]: Mounted media.mount. May 17 00:32:39.127148 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:32:39.128036 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:32:39.128913 systemd[1]: Mounted tmp.mount. May 17 00:32:39.129925 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:32:39.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.131100 systemd[1]: Finished kmod-static-nodes.service. May 17 00:32:39.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.132162 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:32:39.132409 systemd[1]: Finished modprobe@configfs.service. May 17 00:32:39.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.133000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.133626 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:39.133794 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:39.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.134829 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:32:39.135025 systemd[1]: Finished modprobe@drm.service. May 17 00:32:39.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.136166 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:39.136382 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:39.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.137563 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:32:39.137801 systemd[1]: Finished modprobe@fuse.service. May 17 00:32:39.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.138930 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:39.139085 systemd[1]: Finished modprobe@loop.service. May 17 00:32:39.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.140280 systemd[1]: Finished systemd-modules-load.service. May 17 00:32:39.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.141778 systemd[1]: Finished systemd-network-generator.service. May 17 00:32:39.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.143189 systemd[1]: Finished systemd-remount-fs.service. May 17 00:32:39.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.144755 systemd[1]: Reached target network-pre.target. May 17 00:32:39.147021 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:32:39.149263 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:32:39.150287 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:32:39.151447 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:32:39.153327 systemd[1]: Starting systemd-journal-flush.service... May 17 00:32:39.154427 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:39.155354 systemd[1]: Starting systemd-random-seed.service... May 17 00:32:39.156457 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:39.158336 systemd-journald[999]: Time spent on flushing to /var/log/journal/ff96af2c4a094c5fa147b7dc85671d9b is 14.611ms for 1088 entries. May 17 00:32:39.158336 systemd-journald[999]: System Journal (/var/log/journal/ff96af2c4a094c5fa147b7dc85671d9b) is 8.0M, max 195.6M, 187.6M free. May 17 00:32:39.196630 systemd-journald[999]: Received client request to flush runtime journal. May 17 00:32:39.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.157412 systemd[1]: Starting systemd-sysctl.service... May 17 00:32:39.160102 systemd[1]: Starting systemd-sysusers.service... May 17 00:32:39.163366 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:32:39.197765 udevadm[1021]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:32:39.164387 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:32:39.165378 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:32:39.167544 systemd[1]: Starting systemd-udev-settle.service... May 17 00:32:39.168602 systemd[1]: Finished systemd-random-seed.service. May 17 00:32:39.169611 systemd[1]: Reached target first-boot-complete.target. May 17 00:32:39.176858 systemd[1]: Finished systemd-sysctl.service. May 17 00:32:39.183561 systemd[1]: Finished systemd-sysusers.service. May 17 00:32:39.197464 systemd[1]: Finished systemd-journal-flush.service. May 17 00:32:39.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.559673 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:32:39.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.561000 audit: BPF prog-id=18 op=LOAD May 17 00:32:39.561000 audit: BPF prog-id=19 op=LOAD May 17 00:32:39.561000 audit: BPF prog-id=7 op=UNLOAD May 17 00:32:39.561000 audit: BPF prog-id=8 op=UNLOAD May 17 00:32:39.561765 systemd[1]: Starting systemd-udevd.service... May 17 00:32:39.575788 systemd-udevd[1024]: Using default interface naming scheme 'v252'. May 17 00:32:39.586421 systemd[1]: Started systemd-udevd.service. May 17 00:32:39.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.588000 audit: BPF prog-id=20 op=LOAD May 17 00:32:39.588741 systemd[1]: Starting systemd-networkd.service... May 17 00:32:39.593000 audit: BPF prog-id=21 op=LOAD May 17 00:32:39.593000 audit: BPF prog-id=22 op=LOAD May 17 00:32:39.593000 audit: BPF prog-id=23 op=LOAD May 17 00:32:39.594171 systemd[1]: Starting systemd-userdbd.service... May 17 00:32:39.624085 systemd[1]: Started systemd-userdbd.service. May 17 00:32:39.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.633379 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:32:39.643540 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:32:39.660206 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:32:39.665951 systemd-networkd[1029]: lo: Link UP May 17 00:32:39.665957 systemd-networkd[1029]: lo: Gained carrier May 17 00:32:39.666306 systemd-networkd[1029]: Enumeration completed May 17 00:32:39.666390 systemd-networkd[1029]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:32:39.666398 systemd[1]: Started systemd-networkd.service. May 17 00:32:39.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.668548 systemd-networkd[1029]: eth0: Link UP May 17 00:32:39.668551 systemd-networkd[1029]: eth0: Gained carrier May 17 00:32:39.669322 kernel: ACPI: button: Power Button [PWRF] May 17 00:32:39.679339 systemd-networkd[1029]: eth0: DHCPv4 address 10.0.0.66/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 17 00:32:39.683000 audit[1039]: AVC avc: denied { confidentiality } for pid=1039 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:32:39.683000 audit[1039]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563ab268e810 a1=338ac a2=7f1208576bc5 a3=5 items=110 ppid=1024 pid=1039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:39.683000 audit: CWD cwd="/" May 17 00:32:39.683000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=1 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=2 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=3 name=(null) inode=14153 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=4 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=5 name=(null) inode=14154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=6 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=7 name=(null) inode=14155 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=8 name=(null) inode=14155 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=9 name=(null) inode=14156 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=10 name=(null) inode=14155 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=11 name=(null) inode=14157 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=12 name=(null) inode=14155 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=13 name=(null) inode=14158 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=14 name=(null) inode=14155 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=15 name=(null) inode=14159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=16 name=(null) inode=14155 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=17 name=(null) inode=14160 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=18 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=19 name=(null) inode=14161 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=20 name=(null) inode=14161 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=21 name=(null) inode=14162 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=22 name=(null) inode=14161 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=23 name=(null) inode=14163 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=24 name=(null) inode=14161 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=25 name=(null) inode=14164 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=26 name=(null) inode=14161 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=27 name=(null) inode=14165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=28 name=(null) inode=14161 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=29 name=(null) inode=14166 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=30 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=31 name=(null) inode=14167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=32 name=(null) inode=14167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=33 name=(null) inode=14168 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=34 name=(null) inode=14167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=35 name=(null) inode=14169 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=36 name=(null) inode=14167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=37 name=(null) inode=14170 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=38 name=(null) inode=14167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=39 name=(null) inode=14171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=40 name=(null) inode=14167 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=41 name=(null) inode=14172 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=42 name=(null) inode=14152 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=43 name=(null) inode=14173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=44 name=(null) inode=14173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=45 name=(null) inode=14174 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=46 name=(null) inode=14173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=47 name=(null) inode=14175 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=48 name=(null) inode=14173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=49 name=(null) inode=14176 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=50 name=(null) inode=14173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=51 name=(null) inode=14177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=52 name=(null) inode=14173 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=53 name=(null) inode=14178 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=55 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=56 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=57 name=(null) inode=14180 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=58 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=59 name=(null) inode=14181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=60 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=61 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=62 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=63 name=(null) inode=14183 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=64 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=65 name=(null) inode=14184 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=66 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=67 name=(null) inode=14185 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=68 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=69 name=(null) inode=14186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=70 name=(null) inode=14182 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=71 name=(null) inode=14187 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=72 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=73 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=74 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=75 name=(null) inode=14189 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=76 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=77 name=(null) inode=14190 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=78 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=79 name=(null) inode=14191 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=80 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=81 name=(null) inode=14192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=82 name=(null) inode=14188 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=83 name=(null) inode=14193 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=84 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=85 name=(null) inode=14194 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=86 name=(null) inode=14194 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=87 name=(null) inode=14195 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=88 name=(null) inode=14194 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=89 name=(null) inode=14196 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=90 name=(null) inode=14194 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=91 name=(null) inode=14197 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=92 name=(null) inode=14194 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=93 name=(null) inode=14198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=94 name=(null) inode=14194 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=95 name=(null) inode=14199 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=96 name=(null) inode=14179 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=97 name=(null) inode=14200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=98 name=(null) inode=14200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=99 name=(null) inode=14201 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=100 name=(null) inode=14200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=101 name=(null) inode=14202 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=102 name=(null) inode=14200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=103 name=(null) inode=14203 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=104 name=(null) inode=14200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=105 name=(null) inode=14204 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=106 name=(null) inode=14200 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=107 name=(null) inode=14205 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PATH item=109 name=(null) inode=14208 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:39.683000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:32:39.714196 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 17 00:32:39.719487 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 17 00:32:39.719605 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 17 00:32:39.720191 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:32:39.724192 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:32:39.773833 kernel: kvm: Nested Virtualization enabled May 17 00:32:39.773881 kernel: SVM: kvm: Nested Paging enabled May 17 00:32:39.773895 kernel: SVM: Virtual VMLOAD VMSAVE supported May 17 00:32:39.773920 kernel: SVM: Virtual GIF supported May 17 00:32:39.790212 kernel: EDAC MC: Ver: 3.0.0 May 17 00:32:39.815543 systemd[1]: Finished systemd-udev-settle.service. May 17 00:32:39.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.817556 systemd[1]: Starting lvm2-activation-early.service... May 17 00:32:39.824478 lvm[1060]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:32:39.848761 systemd[1]: Finished lvm2-activation-early.service. May 17 00:32:39.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.849799 systemd[1]: Reached target cryptsetup.target. May 17 00:32:39.851553 systemd[1]: Starting lvm2-activation.service... May 17 00:32:39.854304 lvm[1061]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:32:39.880172 systemd[1]: Finished lvm2-activation.service. May 17 00:32:39.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.881202 systemd[1]: Reached target local-fs-pre.target. May 17 00:32:39.882103 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:32:39.882127 systemd[1]: Reached target local-fs.target. May 17 00:32:39.882995 systemd[1]: Reached target machines.target. May 17 00:32:39.884835 systemd[1]: Starting ldconfig.service... May 17 00:32:39.885934 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:39.885970 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:39.886746 systemd[1]: Starting systemd-boot-update.service... May 17 00:32:39.888649 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:32:39.890650 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:32:39.893320 systemd[1]: Starting systemd-sysext.service... May 17 00:32:39.895493 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:32:39.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.897406 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1063 (bootctl) May 17 00:32:39.898394 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:32:39.903823 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:32:39.907994 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:32:39.908137 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:32:39.928199 kernel: loop0: detected capacity change from 0 to 229808 May 17 00:32:39.932193 systemd-fsck[1071]: fsck.fat 4.2 (2021-01-31) May 17 00:32:39.932193 systemd-fsck[1071]: /dev/vda1: 790 files, 120726/258078 clusters May 17 00:32:39.933976 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:32:39.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:39.937799 systemd[1]: Mounting boot.mount... May 17 00:32:39.948536 systemd[1]: Mounted boot.mount. May 17 00:32:40.274137 systemd[1]: Finished systemd-boot-update.service. May 17 00:32:40.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.277202 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:32:40.297203 kernel: loop1: detected capacity change from 0 to 229808 May 17 00:32:40.322730 (sd-sysext)[1076]: Using extensions 'kubernetes'. May 17 00:32:40.323135 (sd-sysext)[1076]: Merged extensions into '/usr'. May 17 00:32:40.338723 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.339152 ldconfig[1062]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:32:40.339935 systemd[1]: Mounting usr-share-oem.mount... May 17 00:32:40.340915 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:40.341818 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:40.343563 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:40.345299 systemd[1]: Starting modprobe@loop.service... May 17 00:32:40.346128 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:40.346293 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:40.346417 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.349122 systemd[1]: Mounted usr-share-oem.mount. May 17 00:32:40.350312 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:40.350431 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:40.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.351714 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:40.351821 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:40.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.353144 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:40.353286 systemd[1]: Finished modprobe@loop.service. May 17 00:32:40.354000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.354654 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:40.354756 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:40.355690 systemd[1]: Finished systemd-sysext.service. May 17 00:32:40.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.357602 systemd[1]: Starting ensure-sysext.service... May 17 00:32:40.359220 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:32:40.364424 systemd[1]: Reloading. May 17 00:32:40.371592 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:32:40.373140 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:32:40.375656 systemd-tmpfiles[1083]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:32:40.411205 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2025-05-17T00:32:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:32:40.411471 /usr/lib/systemd/system-generators/torcx-generator[1103]: time="2025-05-17T00:32:40Z" level=info msg="torcx already run" May 17 00:32:40.526060 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:32:40.526079 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:32:40.543685 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:32:40.593000 audit: BPF prog-id=24 op=LOAD May 17 00:32:40.593000 audit: BPF prog-id=25 op=LOAD May 17 00:32:40.593000 audit: BPF prog-id=18 op=UNLOAD May 17 00:32:40.593000 audit: BPF prog-id=19 op=UNLOAD May 17 00:32:40.594000 audit: BPF prog-id=26 op=LOAD May 17 00:32:40.594000 audit: BPF prog-id=21 op=UNLOAD May 17 00:32:40.594000 audit: BPF prog-id=27 op=LOAD May 17 00:32:40.594000 audit: BPF prog-id=28 op=LOAD May 17 00:32:40.594000 audit: BPF prog-id=22 op=UNLOAD May 17 00:32:40.594000 audit: BPF prog-id=23 op=UNLOAD May 17 00:32:40.597000 audit: BPF prog-id=29 op=LOAD May 17 00:32:40.597000 audit: BPF prog-id=15 op=UNLOAD May 17 00:32:40.597000 audit: BPF prog-id=30 op=LOAD May 17 00:32:40.597000 audit: BPF prog-id=31 op=LOAD May 17 00:32:40.597000 audit: BPF prog-id=16 op=UNLOAD May 17 00:32:40.597000 audit: BPF prog-id=17 op=UNLOAD May 17 00:32:40.597000 audit: BPF prog-id=32 op=LOAD May 17 00:32:40.598000 audit: BPF prog-id=20 op=UNLOAD May 17 00:32:40.599883 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:32:40.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.604100 systemd[1]: Starting audit-rules.service... May 17 00:32:40.606069 systemd[1]: Starting clean-ca-certificates.service... May 17 00:32:40.608059 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:32:40.609000 audit: BPF prog-id=33 op=LOAD May 17 00:32:40.610432 systemd[1]: Starting systemd-resolved.service... May 17 00:32:40.611000 audit: BPF prog-id=34 op=LOAD May 17 00:32:40.612550 systemd[1]: Starting systemd-timesyncd.service... May 17 00:32:40.614330 systemd[1]: Starting systemd-update-utmp.service... May 17 00:32:40.615668 systemd[1]: Finished clean-ca-certificates.service. May 17 00:32:40.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.618000 audit[1152]: SYSTEM_BOOT pid=1152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:32:40.620288 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:40.622672 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.622850 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:40.624022 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:40.634115 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:40.636591 systemd[1]: Starting modprobe@loop.service... May 17 00:32:40.637585 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:40.637696 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:40.637789 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:40.637884 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.639336 systemd[1]: Finished ldconfig.service. May 17 00:32:40.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.640702 systemd[1]: Finished systemd-update-utmp.service. May 17 00:32:40.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.642400 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:40.642537 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:40.643000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.643916 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:40.644052 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:40.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.645501 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:40.645607 systemd[1]: Finished modprobe@loop.service. May 17 00:32:40.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.646000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.647055 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:32:40.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.650806 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:32:40.651633 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:32:40.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.654481 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.654683 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:40.655922 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:40.657984 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:40.660898 systemd[1]: Starting modprobe@loop.service... May 17 00:32:40.662060 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:40.662196 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:40.663533 systemd[1]: Starting systemd-update-done.service... May 17 00:32:40.664563 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:40.664671 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.665802 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:40.665937 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:40.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.666000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.667426 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:40.667548 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:40.668945 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:40.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.669062 systemd[1]: Finished modprobe@loop.service. May 17 00:32:40.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:40.670624 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:40.670765 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:40.674031 systemd[1]: Finished systemd-update-done.service. May 17 00:32:40.674000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:32:40.674000 audit[1173]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd810e8470 a2=420 a3=0 items=0 ppid=1146 pid=1173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:40.674000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:32:40.675193 augenrules[1173]: No rules May 17 00:32:40.675686 systemd[1]: Finished audit-rules.service. May 17 00:32:40.676984 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.677237 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:40.678797 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:40.680723 systemd[1]: Starting modprobe@drm.service... May 17 00:32:40.682878 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:40.684969 systemd[1]: Starting modprobe@loop.service... May 17 00:32:40.686012 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:40.686125 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:40.687183 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:32:40.687280 systemd-resolved[1149]: Positive Trust Anchors: May 17 00:32:40.687290 systemd-resolved[1149]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:32:40.687319 systemd-resolved[1149]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:32:40.688575 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:40.688691 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:40.689841 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:40.689967 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:40.691608 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:32:40.691729 systemd[1]: Finished modprobe@drm.service. May 17 00:32:40.693345 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:40.693473 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:40.695255 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:40.695402 systemd[1]: Finished modprobe@loop.service. May 17 00:32:40.696236 systemd-resolved[1149]: Defaulting to hostname 'linux'. May 17 00:32:40.698099 systemd[1]: Finished ensure-sysext.service. May 17 00:32:40.699161 systemd[1]: Started systemd-resolved.service. May 17 00:32:40.701162 systemd[1]: Reached target network.target. May 17 00:32:40.702291 systemd[1]: Reached target nss-lookup.target. May 17 00:32:40.703258 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:40.703307 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:40.713007 systemd[1]: Started systemd-timesyncd.service. May 17 00:32:40.714196 systemd[1]: Reached target sysinit.target. May 17 00:32:40.715538 systemd[1]: Started motdgen.path. May 17 00:32:40.716693 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:32:40.718109 systemd-timesyncd[1150]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 17 00:32:40.718140 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:32:40.718161 systemd-timesyncd[1150]: Initial clock synchronization to Sat 2025-05-17 00:32:41.025603 UTC. May 17 00:32:40.719202 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:32:40.719230 systemd[1]: Reached target paths.target. May 17 00:32:40.720140 systemd[1]: Reached target time-set.target. May 17 00:32:40.721310 systemd[1]: Started logrotate.timer. May 17 00:32:40.722251 systemd[1]: Started mdadm.timer. May 17 00:32:40.723063 systemd[1]: Reached target timers.target. May 17 00:32:40.724278 systemd[1]: Listening on dbus.socket. May 17 00:32:40.726133 systemd[1]: Starting docker.socket... May 17 00:32:40.728757 systemd[1]: Listening on sshd.socket. May 17 00:32:40.729704 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:40.730114 systemd[1]: Listening on docker.socket. May 17 00:32:40.731011 systemd[1]: Reached target sockets.target. May 17 00:32:40.731884 systemd[1]: Reached target basic.target. May 17 00:32:40.732757 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:32:40.732782 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:32:40.733558 systemd[1]: Starting containerd.service... May 17 00:32:40.735101 systemd[1]: Starting dbus.service... May 17 00:32:40.736757 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:32:40.738631 systemd[1]: Starting extend-filesystems.service... May 17 00:32:40.739505 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:32:40.739902 jq[1188]: false May 17 00:32:40.740519 systemd[1]: Starting motdgen.service... May 17 00:32:40.742153 systemd[1]: Starting prepare-helm.service... May 17 00:32:40.744073 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:32:40.748612 systemd[1]: Starting sshd-keygen.service... May 17 00:32:40.752360 systemd[1]: Starting systemd-logind.service... May 17 00:32:40.753233 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:40.753317 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:32:40.753715 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:32:40.754387 systemd[1]: Starting update-engine.service... May 17 00:32:40.756465 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:32:40.759825 dbus-daemon[1187]: [system] SELinux support is enabled May 17 00:32:40.760038 jq[1206]: true May 17 00:32:40.760787 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:32:40.760966 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:32:40.761118 systemd[1]: Started dbus.service. May 17 00:32:40.764149 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:32:40.764326 systemd[1]: Finished motdgen.service. May 17 00:32:40.765699 extend-filesystems[1189]: Found loop1 May 17 00:32:40.765699 extend-filesystems[1189]: Found sr0 May 17 00:32:40.765699 extend-filesystems[1189]: Found vda May 17 00:32:40.765699 extend-filesystems[1189]: Found vda1 May 17 00:32:40.765699 extend-filesystems[1189]: Found vda2 May 17 00:32:40.765699 extend-filesystems[1189]: Found vda3 May 17 00:32:40.765699 extend-filesystems[1189]: Found usr May 17 00:32:40.788360 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:32:40.801796 extend-filesystems[1189]: Found vda4 May 17 00:32:40.801796 extend-filesystems[1189]: Found vda6 May 17 00:32:40.801796 extend-filesystems[1189]: Found vda7 May 17 00:32:40.801796 extend-filesystems[1189]: Found vda9 May 17 00:32:40.801796 extend-filesystems[1189]: Checking size of /dev/vda9 May 17 00:32:40.837761 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 17 00:32:40.837825 tar[1209]: linux-amd64/LICENSE May 17 00:32:40.837825 tar[1209]: linux-amd64/helm May 17 00:32:40.788576 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:32:40.838207 extend-filesystems[1189]: Resized partition /dev/vda9 May 17 00:32:40.839330 update_engine[1204]: I0517 00:32:40.810748 1204 main.cc:92] Flatcar Update Engine starting May 17 00:32:40.839330 update_engine[1204]: I0517 00:32:40.812572 1204 update_check_scheduler.cc:74] Next update check in 9m36s May 17 00:32:40.839506 jq[1213]: true May 17 00:32:40.800691 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:32:40.839780 extend-filesystems[1226]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:32:40.800715 systemd[1]: Reached target system-config.target. May 17 00:32:40.802919 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:32:40.802935 systemd[1]: Reached target user-config.target. May 17 00:32:40.812533 systemd[1]: Started update-engine.service. May 17 00:32:40.815991 systemd[1]: Started locksmithd.service. May 17 00:32:40.828273 systemd-logind[1203]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:32:40.828293 systemd-logind[1203]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:32:40.830889 systemd-logind[1203]: New seat seat0. May 17 00:32:40.841141 systemd[1]: Started systemd-logind.service. May 17 00:32:40.844687 env[1214]: time="2025-05-17T00:32:40.844494311Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:32:40.874198 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 17 00:32:40.878007 env[1214]: time="2025-05-17T00:32:40.877952639Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.903686348Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905018316Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905051999Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905289164Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905316115Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905328879Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905337415Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905410873Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905640634Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:40.906215 env[1214]: time="2025-05-17T00:32:40.905754106Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:32:40.906456 extend-filesystems[1226]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 17 00:32:40.906456 extend-filesystems[1226]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:32:40.906456 extend-filesystems[1226]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 17 00:32:40.880327 systemd-networkd[1029]: eth0: Gained IPv6LL May 17 00:32:40.911801 env[1214]: time="2025-05-17T00:32:40.905766540Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:32:40.911801 env[1214]: time="2025-05-17T00:32:40.905866638Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:32:40.911801 env[1214]: time="2025-05-17T00:32:40.905878309Z" level=info msg="metadata content store policy set" policy=shared May 17 00:32:40.911868 extend-filesystems[1189]: Resized filesystem in /dev/vda9 May 17 00:32:40.882071 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:32:40.883860 systemd[1]: Reached target network-online.target. May 17 00:32:40.886923 systemd[1]: Starting kubelet.service... May 17 00:32:40.892532 locksmithd[1224]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:32:40.906720 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:32:40.906849 systemd[1]: Finished extend-filesystems.service. May 17 00:32:40.915331 bash[1241]: Updated "/home/core/.ssh/authorized_keys" May 17 00:32:40.915801 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:32:40.918020 env[1214]: time="2025-05-17T00:32:40.917804439Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:32:40.918020 env[1214]: time="2025-05-17T00:32:40.917857439Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:32:40.918020 env[1214]: time="2025-05-17T00:32:40.917883648Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:32:40.918020 env[1214]: time="2025-05-17T00:32:40.917940184Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918020 env[1214]: time="2025-05-17T00:32:40.917955944Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918020 env[1214]: time="2025-05-17T00:32:40.917971292Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918295 env[1214]: time="2025-05-17T00:32:40.918042726Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918295 env[1214]: time="2025-05-17T00:32:40.918059548Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918295 env[1214]: time="2025-05-17T00:32:40.918075177Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918295 env[1214]: time="2025-05-17T00:32:40.918088953Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918295 env[1214]: time="2025-05-17T00:32:40.918101877Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918295 env[1214]: time="2025-05-17T00:32:40.918115503Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:32:40.918428 env[1214]: time="2025-05-17T00:32:40.918378306Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:32:40.918489 env[1214]: time="2025-05-17T00:32:40.918462103Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:32:40.918741 env[1214]: time="2025-05-17T00:32:40.918714907Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:32:40.918788 env[1214]: time="2025-05-17T00:32:40.918746146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918788 env[1214]: time="2025-05-17T00:32:40.918760944Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:32:40.918834 env[1214]: time="2025-05-17T00:32:40.918803944Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918834 env[1214]: time="2025-05-17T00:32:40.918817981Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918834 env[1214]: time="2025-05-17T00:32:40.918831566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918908 env[1214]: time="2025-05-17T00:32:40.918861672Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918908 env[1214]: time="2025-05-17T00:32:40.918875929Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918908 env[1214]: time="2025-05-17T00:32:40.918889054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918908 env[1214]: time="2025-05-17T00:32:40.918900846Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918997 env[1214]: time="2025-05-17T00:32:40.918913189Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:32:40.918997 env[1214]: time="2025-05-17T00:32:40.918929470Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:32:40.919047 env[1214]: time="2025-05-17T00:32:40.919037182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:32:40.919073 env[1214]: time="2025-05-17T00:32:40.919052320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:32:40.919073 env[1214]: time="2025-05-17T00:32:40.919066437Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:32:40.919120 env[1214]: time="2025-05-17T00:32:40.919078529Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:32:40.919120 env[1214]: time="2025-05-17T00:32:40.919095812Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:32:40.919120 env[1214]: time="2025-05-17T00:32:40.919107163Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:32:40.919216 env[1214]: time="2025-05-17T00:32:40.919127581Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:32:40.919216 env[1214]: time="2025-05-17T00:32:40.919163328Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:32:40.919477 env[1214]: time="2025-05-17T00:32:40.919394632Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:32:40.919477 env[1214]: time="2025-05-17T00:32:40.919460546Z" level=info msg="Connect containerd service" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.919494159Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920084656Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920364852Z" level=info msg="Start subscribing containerd event" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920415367Z" level=info msg="Start recovering state" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920509093Z" level=info msg="Start event monitor" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920527527Z" level=info msg="Start snapshots syncer" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920553927Z" level=info msg="Start cni network conf syncer for default" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920562092Z" level=info msg="Start streaming server" May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920846946Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:32:40.920927 env[1214]: time="2025-05-17T00:32:40.920895247Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:32:40.922441 systemd[1]: Started containerd.service. May 17 00:32:40.925028 env[1214]: time="2025-05-17T00:32:40.924991360Z" level=info msg="containerd successfully booted in 0.082171s" May 17 00:32:41.262216 tar[1209]: linux-amd64/README.md May 17 00:32:41.266408 systemd[1]: Finished prepare-helm.service. May 17 00:32:41.585656 systemd[1]: Started kubelet.service. May 17 00:32:41.942773 sshd_keygen[1208]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:32:41.962649 systemd[1]: Finished sshd-keygen.service. May 17 00:32:41.964814 systemd[1]: Starting issuegen.service... May 17 00:32:41.969996 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:32:41.970159 systemd[1]: Finished issuegen.service. May 17 00:32:41.972592 systemd[1]: Starting systemd-user-sessions.service... May 17 00:32:41.977239 systemd[1]: Finished systemd-user-sessions.service. May 17 00:32:41.979490 systemd[1]: Started getty@tty1.service. May 17 00:32:41.981492 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:32:41.982663 systemd[1]: Reached target getty.target. May 17 00:32:41.983708 systemd[1]: Reached target multi-user.target. May 17 00:32:41.985769 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:32:41.994261 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:32:41.994435 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:32:41.995705 systemd[1]: Startup finished in 645ms (kernel) + 4.802s (initrd) + 5.466s (userspace) = 10.913s. May 17 00:32:42.023786 kubelet[1257]: E0517 00:32:42.023737 1257 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:32:42.025424 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:32:42.025534 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:32:44.926605 systemd[1]: Created slice system-sshd.slice. May 17 00:32:44.927856 systemd[1]: Started sshd@0-10.0.0.66:22-10.0.0.1:58262.service. May 17 00:32:44.968747 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 58262 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:32:44.970328 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:44.978830 systemd-logind[1203]: New session 1 of user core. May 17 00:32:44.979850 systemd[1]: Created slice user-500.slice. May 17 00:32:44.980974 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:32:44.989157 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:32:44.990734 systemd[1]: Starting user@500.service... May 17 00:32:44.994457 (systemd)[1282]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:45.078244 systemd[1282]: Queued start job for default target default.target. May 17 00:32:45.078732 systemd[1282]: Reached target paths.target. May 17 00:32:45.078768 systemd[1282]: Reached target sockets.target. May 17 00:32:45.078783 systemd[1282]: Reached target timers.target. May 17 00:32:45.078797 systemd[1282]: Reached target basic.target. May 17 00:32:45.078835 systemd[1282]: Reached target default.target. May 17 00:32:45.078860 systemd[1282]: Startup finished in 78ms. May 17 00:32:45.078941 systemd[1]: Started user@500.service. May 17 00:32:45.079991 systemd[1]: Started session-1.scope. May 17 00:32:45.132931 systemd[1]: Started sshd@1-10.0.0.66:22-10.0.0.1:58272.service. May 17 00:32:45.168671 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 58272 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:32:45.170798 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:45.175481 systemd-logind[1203]: New session 2 of user core. May 17 00:32:45.177042 systemd[1]: Started session-2.scope. May 17 00:32:45.232908 sshd[1291]: pam_unix(sshd:session): session closed for user core May 17 00:32:45.236805 systemd[1]: Started sshd@2-10.0.0.66:22-10.0.0.1:58288.service. May 17 00:32:45.237217 systemd[1]: sshd@1-10.0.0.66:22-10.0.0.1:58272.service: Deactivated successfully. May 17 00:32:45.237789 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:32:45.238416 systemd-logind[1203]: Session 2 logged out. Waiting for processes to exit. May 17 00:32:45.239540 systemd-logind[1203]: Removed session 2. May 17 00:32:45.270428 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 58288 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:32:45.271596 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:45.274857 systemd-logind[1203]: New session 3 of user core. May 17 00:32:45.275758 systemd[1]: Started session-3.scope. May 17 00:32:45.326832 sshd[1296]: pam_unix(sshd:session): session closed for user core May 17 00:32:45.329244 systemd[1]: sshd@2-10.0.0.66:22-10.0.0.1:58288.service: Deactivated successfully. May 17 00:32:45.329726 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:32:45.330208 systemd-logind[1203]: Session 3 logged out. Waiting for processes to exit. May 17 00:32:45.331025 systemd[1]: Started sshd@3-10.0.0.66:22-10.0.0.1:58300.service. May 17 00:32:45.331714 systemd-logind[1203]: Removed session 3. May 17 00:32:45.365388 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 58300 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:32:45.366767 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:45.370569 systemd-logind[1203]: New session 4 of user core. May 17 00:32:45.371718 systemd[1]: Started session-4.scope. May 17 00:32:45.428573 sshd[1303]: pam_unix(sshd:session): session closed for user core May 17 00:32:45.432223 systemd[1]: Started sshd@4-10.0.0.66:22-10.0.0.1:58308.service. May 17 00:32:45.433312 systemd[1]: sshd@3-10.0.0.66:22-10.0.0.1:58300.service: Deactivated successfully. May 17 00:32:45.433910 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:32:45.434535 systemd-logind[1203]: Session 4 logged out. Waiting for processes to exit. May 17 00:32:45.435382 systemd-logind[1203]: Removed session 4. May 17 00:32:45.471340 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 58308 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:32:45.472758 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:45.477107 systemd-logind[1203]: New session 5 of user core. May 17 00:32:45.478075 systemd[1]: Started session-5.scope. May 17 00:32:45.534992 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:32:45.535185 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:45.546432 dbus-daemon[1187]: \xd0m\xf5lrU: received setenforce notice (enforcing=-883411776) May 17 00:32:45.548262 sudo[1312]: pam_unix(sudo:session): session closed for user root May 17 00:32:45.550131 sshd[1308]: pam_unix(sshd:session): session closed for user core May 17 00:32:45.553064 systemd[1]: sshd@4-10.0.0.66:22-10.0.0.1:58308.service: Deactivated successfully. May 17 00:32:45.553693 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:32:45.554301 systemd-logind[1203]: Session 5 logged out. Waiting for processes to exit. May 17 00:32:45.555221 systemd[1]: Started sshd@5-10.0.0.66:22-10.0.0.1:58322.service. May 17 00:32:45.556039 systemd-logind[1203]: Removed session 5. May 17 00:32:45.592163 sshd[1316]: Accepted publickey for core from 10.0.0.1 port 58322 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:32:45.593390 sshd[1316]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:45.597924 systemd-logind[1203]: New session 6 of user core. May 17 00:32:45.598919 systemd[1]: Started session-6.scope. May 17 00:32:45.654258 sudo[1320]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:32:45.654434 sudo[1320]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:45.657250 sudo[1320]: pam_unix(sudo:session): session closed for user root May 17 00:32:45.661766 sudo[1319]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:32:45.661962 sudo[1319]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:45.670439 systemd[1]: Stopping audit-rules.service... May 17 00:32:45.670000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:32:45.671998 auditctl[1323]: No rules May 17 00:32:45.672446 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:32:45.672655 systemd[1]: Stopped audit-rules.service. May 17 00:32:45.672947 kernel: kauditd_printk_skb: 274 callbacks suppressed May 17 00:32:45.672986 kernel: audit: type=1305 audit(1747441965.670:195): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:32:45.674528 systemd[1]: Starting audit-rules.service... May 17 00:32:45.670000 audit[1323]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2242f770 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:45.681181 kernel: audit: type=1300 audit(1747441965.670:195): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff2242f770 a2=420 a3=0 items=0 ppid=1 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:45.681234 kernel: audit: type=1327 audit(1747441965.670:195): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:32:45.670000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:32:45.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.689267 kernel: audit: type=1131 audit(1747441965.671:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.692516 augenrules[1340]: No rules May 17 00:32:45.693173 systemd[1]: Finished audit-rules.service. May 17 00:32:45.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.694140 sudo[1319]: pam_unix(sudo:session): session closed for user root May 17 00:32:45.695740 sshd[1316]: pam_unix(sshd:session): session closed for user core May 17 00:32:45.693000 audit[1319]: USER_END pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:45.699130 systemd[1]: sshd@5-10.0.0.66:22-10.0.0.1:58322.service: Deactivated successfully. May 17 00:32:45.699825 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:32:45.700503 systemd-logind[1203]: Session 6 logged out. Waiting for processes to exit. May 17 00:32:45.701345 kernel: audit: type=1130 audit(1747441965.692:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.701407 kernel: audit: type=1106 audit(1747441965.693:198): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:45.701434 kernel: audit: type=1104 audit(1747441965.693:199): pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:45.693000 audit[1319]: CRED_DISP pid=1319 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:45.701675 systemd[1]: Started sshd@6-10.0.0.66:22-10.0.0.1:58332.service. May 17 00:32:45.702869 systemd-logind[1203]: Removed session 6. May 17 00:32:45.704967 kernel: audit: type=1106 audit(1747441965.695:200): pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.695000 audit[1316]: USER_END pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.695000 audit[1316]: CRED_DISP pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.713671 kernel: audit: type=1104 audit(1747441965.695:201): pid=1316 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.713715 kernel: audit: type=1131 audit(1747441965.698:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.66:22-10.0.0.1:58322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.66:22-10.0.0.1:58322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.700000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.66:22-10.0.0.1:58332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.737000 audit[1346]: USER_ACCT pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.737749 sshd[1346]: Accepted publickey for core from 10.0.0.1 port 58332 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:32:45.737000 audit[1346]: CRED_ACQ pid=1346 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.737000 audit[1346]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd763494a0 a2=3 a3=0 items=0 ppid=1 pid=1346 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:45.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:32:45.738666 sshd[1346]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:45.742273 systemd-logind[1203]: New session 7 of user core. May 17 00:32:45.743341 systemd[1]: Started session-7.scope. May 17 00:32:45.747000 audit[1346]: USER_START pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.748000 audit[1348]: CRED_ACQ pid=1348 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:45.797000 audit[1349]: USER_ACCT pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:45.798681 sudo[1349]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:32:45.797000 audit[1349]: CRED_REFR pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:45.798961 sudo[1349]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:45.799000 audit[1349]: USER_START pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:45.820465 systemd[1]: Starting docker.service... May 17 00:32:45.859103 env[1361]: time="2025-05-17T00:32:45.859041304Z" level=info msg="Starting up" May 17 00:32:45.860652 env[1361]: time="2025-05-17T00:32:45.860609627Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:32:45.860652 env[1361]: time="2025-05-17T00:32:45.860643847Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:32:45.860735 env[1361]: time="2025-05-17T00:32:45.860665476Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:32:45.860735 env[1361]: time="2025-05-17T00:32:45.860675762Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:32:45.862196 env[1361]: time="2025-05-17T00:32:45.862158627Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:32:45.862196 env[1361]: time="2025-05-17T00:32:45.862176484Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:32:45.862196 env[1361]: time="2025-05-17T00:32:45.862187253Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:32:45.862280 env[1361]: time="2025-05-17T00:32:45.862208154Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:32:46.542760 env[1361]: time="2025-05-17T00:32:46.542716785Z" level=info msg="Loading containers: start." May 17 00:32:46.591000 audit[1396]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.591000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc9c7eb9d0 a2=0 a3=7ffc9c7eb9bc items=0 ppid=1361 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:32:46.592000 audit[1398]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.592000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc3987f0f0 a2=0 a3=7ffc3987f0dc items=0 ppid=1361 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.592000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:32:46.594000 audit[1400]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.594000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffea043f620 a2=0 a3=7ffea043f60c items=0 ppid=1361 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.594000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:32:46.595000 audit[1402]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.595000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd42136bd0 a2=0 a3=7ffd42136bbc items=0 ppid=1361 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.595000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:32:46.597000 audit[1404]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.597000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff10b46a90 a2=0 a3=7fff10b46a7c items=0 ppid=1361 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:32:46.613000 audit[1409]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.613000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd112b77b0 a2=0 a3=7ffd112b779c items=0 ppid=1361 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.613000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:32:46.624000 audit[1411]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.624000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc9e23c2f0 a2=0 a3=7ffc9e23c2dc items=0 ppid=1361 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.624000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:32:46.625000 audit[1413]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.625000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdc4995890 a2=0 a3=7ffdc499587c items=0 ppid=1361 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.625000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:32:46.627000 audit[1415]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.627000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe75e79740 a2=0 a3=7ffe75e7972c items=0 ppid=1361 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.627000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:46.634000 audit[1419]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.634000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcdcd64ce0 a2=0 a3=7ffcdcd64ccc items=0 ppid=1361 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:46.638000 audit[1420]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.638000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc74c45210 a2=0 a3=7ffc74c451fc items=0 ppid=1361 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:46.648220 kernel: Initializing XFRM netlink socket May 17 00:32:46.674613 env[1361]: time="2025-05-17T00:32:46.674569788Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:32:46.690000 audit[1428]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.690000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdbf8e87c0 a2=0 a3=7ffdbf8e87ac items=0 ppid=1361 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.690000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:32:46.703000 audit[1431]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.703000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff24feb650 a2=0 a3=7fff24feb63c items=0 ppid=1361 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.703000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:32:46.706000 audit[1434]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.706000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffca1a95a00 a2=0 a3=7ffca1a959ec items=0 ppid=1361 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:32:46.708000 audit[1436]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.708000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc53649ad0 a2=0 a3=7ffc53649abc items=0 ppid=1361 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.708000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:32:46.710000 audit[1438]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.710000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd698f07a0 a2=0 a3=7ffd698f078c items=0 ppid=1361 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.710000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:32:46.712000 audit[1440]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.712000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd1748b210 a2=0 a3=7ffd1748b1fc items=0 ppid=1361 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.712000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:32:46.713000 audit[1442]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.713000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffca6f736d0 a2=0 a3=7ffca6f736bc items=0 ppid=1361 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.713000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:32:46.721000 audit[1445]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.721000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd488c6f90 a2=0 a3=7ffd488c6f7c items=0 ppid=1361 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.721000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:32:46.723000 audit[1447]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.723000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe1c009020 a2=0 a3=7ffe1c00900c items=0 ppid=1361 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.723000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:32:46.726000 audit[1449]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1449 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.726000 audit[1449]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd1ff9b170 a2=0 a3=7ffd1ff9b15c items=0 ppid=1361 pid=1449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.726000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:32:46.728000 audit[1451]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1451 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.728000 audit[1451]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd172ec690 a2=0 a3=7ffd172ec67c items=0 ppid=1361 pid=1451 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:32:46.728921 systemd-networkd[1029]: docker0: Link UP May 17 00:32:46.737000 audit[1455]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1455 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.737000 audit[1455]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedcbc57c0 a2=0 a3=7ffedcbc57ac items=0 ppid=1361 pid=1455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:46.743000 audit[1456]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:46.743000 audit[1456]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffefa276c70 a2=0 a3=7ffefa276c5c items=0 ppid=1361 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:46.744731 env[1361]: time="2025-05-17T00:32:46.744681261Z" level=info msg="Loading containers: done." May 17 00:32:46.760068 env[1361]: time="2025-05-17T00:32:46.760015651Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:32:46.760329 env[1361]: time="2025-05-17T00:32:46.760290761Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:32:46.760400 env[1361]: time="2025-05-17T00:32:46.760386547Z" level=info msg="Daemon has completed initialization" May 17 00:32:46.779247 systemd[1]: Started docker.service. May 17 00:32:46.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.785910 env[1361]: time="2025-05-17T00:32:46.785838344Z" level=info msg="API listen on /run/docker.sock" May 17 00:32:47.301931 env[1214]: time="2025-05-17T00:32:47.301875389Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\"" May 17 00:32:48.023503 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount392461592.mount: Deactivated successfully. May 17 00:32:50.294302 env[1214]: time="2025-05-17T00:32:50.294228524Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:50.299668 env[1214]: time="2025-05-17T00:32:50.299624329Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:50.305290 env[1214]: time="2025-05-17T00:32:50.305255047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:50.310584 env[1214]: time="2025-05-17T00:32:50.310537136Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:d8ae2fb01c39aa1c7add84f3d54425cf081c24c11e3946830292a8cfa4293548,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:50.311341 env[1214]: time="2025-05-17T00:32:50.311309158Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.33.1\" returns image reference \"sha256:c6ab243b29f82a6ce269a5342bfd9ea3d0d4ef0f2bb7e98c6ac0bde1aeafab66\"" May 17 00:32:50.311942 env[1214]: time="2025-05-17T00:32:50.311904495Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\"" May 17 00:32:52.276899 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:32:52.284646 kernel: kauditd_printk_skb: 84 callbacks suppressed May 17 00:32:52.284697 kernel: audit: type=1130 audit(1747441972.275:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:52.284717 kernel: audit: type=1131 audit(1747441972.275:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:52.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:52.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:52.277089 systemd[1]: Stopped kubelet.service. May 17 00:32:52.414704 systemd[1]: Starting kubelet.service... May 17 00:32:52.534630 systemd[1]: Started kubelet.service. May 17 00:32:52.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:52.538198 kernel: audit: type=1130 audit(1747441972.533:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:54.623145 kubelet[1496]: E0517 00:32:54.623072 1496 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:32:54.627221 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:32:54.627333 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:32:54.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:32:54.627577 systemd[1]: kubelet.service: Consumed 2.208s CPU time. May 17 00:32:54.632211 kernel: audit: type=1131 audit(1747441974.626:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:32:56.160684 env[1214]: time="2025-05-17T00:32:56.160605333Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:56.167881 env[1214]: time="2025-05-17T00:32:56.167807738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:56.171544 env[1214]: time="2025-05-17T00:32:56.171508609Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:56.174916 env[1214]: time="2025-05-17T00:32:56.174880580Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:7c9bea694e3a3c01ed6a5ee02d55a6124cc08e0b2eec6caa33f2c396b8cbc3f8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:56.175622 env[1214]: time="2025-05-17T00:32:56.175588089Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.33.1\" returns image reference \"sha256:ef43894fa110c389f7286f4d5a3ea176072c95280efeca60d6a79617cdbbf3e4\"" May 17 00:32:56.176126 env[1214]: time="2025-05-17T00:32:56.176090974Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\"" May 17 00:32:58.544421 env[1214]: time="2025-05-17T00:32:58.544339112Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:58.546526 env[1214]: time="2025-05-17T00:32:58.546468794Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:58.548356 env[1214]: time="2025-05-17T00:32:58.548318610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:58.550259 env[1214]: time="2025-05-17T00:32:58.550210372Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:395b7de7cdbdcc3c3a3db270844a3f71d757e2447a1e4db76b4cce46fba7fd55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:58.551109 env[1214]: time="2025-05-17T00:32:58.551065468Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.33.1\" returns image reference \"sha256:398c985c0d950becc8dcdab5877a8a517ffeafca0792b3fe5f1acff218aeac49\"" May 17 00:32:58.551673 env[1214]: time="2025-05-17T00:32:58.551649077Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\"" May 17 00:32:59.620575 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2926051783.mount: Deactivated successfully. May 17 00:33:00.556198 env[1214]: time="2025-05-17T00:33:00.556117413Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:00.557963 env[1214]: time="2025-05-17T00:33:00.557930776Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:00.559371 env[1214]: time="2025-05-17T00:33:00.559341228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.33.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:00.560759 env[1214]: time="2025-05-17T00:33:00.560713362Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:7ddf379897139ae8ade8b33cb9373b70c632a4d5491da6e234f5d830e0a50807,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:00.561106 env[1214]: time="2025-05-17T00:33:00.561073583Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.33.1\" returns image reference \"sha256:b79c189b052cdbe0e837d0caa6faf1d9fd696d8664fcc462f67d9ea51f26fef2\"" May 17 00:33:00.561709 env[1214]: time="2025-05-17T00:33:00.561679371Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\"" May 17 00:33:01.130160 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3694016524.mount: Deactivated successfully. May 17 00:33:02.446135 env[1214]: time="2025-05-17T00:33:02.446061839Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.449752 env[1214]: time="2025-05-17T00:33:02.449721306Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.453941 env[1214]: time="2025-05-17T00:33:02.453909435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.12.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.456473 env[1214]: time="2025-05-17T00:33:02.456414126Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:40384aa1f5ea6bfdc77997d243aec73da05f27aed0c5e9d65bfa98933c519d97,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.457227 env[1214]: time="2025-05-17T00:33:02.457188733Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.12.0\" returns image reference \"sha256:1cf5f116067c67da67f97bff78c4bbc76913f59057c18627b96facaced73ea0b\"" May 17 00:33:02.457774 env[1214]: time="2025-05-17T00:33:02.457754914Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:33:02.975462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1943642047.mount: Deactivated successfully. May 17 00:33:02.982682 env[1214]: time="2025-05-17T00:33:02.982567845Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.984742 env[1214]: time="2025-05-17T00:33:02.984711368Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.986460 env[1214]: time="2025-05-17T00:33:02.986395901Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.987981 env[1214]: time="2025-05-17T00:33:02.987953881Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:02.988336 env[1214]: time="2025-05-17T00:33:02.988303932Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:33:02.988835 env[1214]: time="2025-05-17T00:33:02.988786491Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\"" May 17 00:33:04.878314 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:33:04.878543 systemd[1]: Stopped kubelet.service. May 17 00:33:04.878601 systemd[1]: kubelet.service: Consumed 2.208s CPU time. May 17 00:33:04.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:04.880058 systemd[1]: Starting kubelet.service... May 17 00:33:04.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:04.887050 kernel: audit: type=1130 audit(1747441984.878:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:04.887136 kernel: audit: type=1131 audit(1747441984.878:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:04.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:04.991533 systemd[1]: Started kubelet.service. May 17 00:33:04.995210 kernel: audit: type=1130 audit(1747441984.990:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:05.025411 kubelet[1507]: E0517 00:33:05.025362 1507 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:33:05.027780 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:33:05.027899 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:33:05.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:33:05.032196 kernel: audit: type=1131 audit(1747441985.026:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:33:06.772072 env[1214]: time="2025-05-17T00:33:06.772024753Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.773964 env[1214]: time="2025-05-17T00:33:06.773934476Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.775861 env[1214]: time="2025-05-17T00:33:06.775834214Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.21-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.777630 env[1214]: time="2025-05-17T00:33:06.777608748Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:d58c035df557080a27387d687092e3fc2b64c6d0e3162dc51453a115f847d121,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.778400 env[1214]: time="2025-05-17T00:33:06.778368361Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.21-0\" returns image reference \"sha256:499038711c0816eda03a1ad96a8eb0440c005baa6949698223c6176b7f5077e1\"" May 17 00:33:09.718415 systemd[1]: Stopped kubelet.service. May 17 00:33:09.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:09.726703 systemd[1]: Starting kubelet.service... May 17 00:33:09.737695 kernel: audit: type=1130 audit(1747441989.717:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:09.737850 kernel: audit: type=1131 audit(1747441989.717:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:09.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:09.815441 systemd[1]: Reloading. May 17 00:33:09.894650 /usr/lib/systemd/system-generators/torcx-generator[1564]: time="2025-05-17T00:33:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:33:09.894685 /usr/lib/systemd/system-generators/torcx-generator[1564]: time="2025-05-17T00:33:09Z" level=info msg="torcx already run" May 17 00:33:10.436668 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:33:10.436696 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:33:10.461508 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:33:10.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.538471 kernel: audit: type=1400 audit(1747441990.529:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.538527 kernel: audit: type=1400 audit(1747441990.529:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.538559 kernel: audit: type=1400 audit(1747441990.529:249): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.541981 kernel: audit: type=1400 audit(1747441990.529:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.548487 kernel: audit: type=1400 audit(1747441990.529:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.548534 kernel: audit: type=1400 audit(1747441990.529:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.551704 kernel: audit: type=1400 audit(1747441990.529:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.554926 kernel: audit: type=1400 audit(1747441990.529:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.558478 kernel: audit: type=1400 audit(1747441990.537:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit: BPF prog-id=40 op=LOAD May 17 00:33:10.562452 kernel: audit: type=1334 audit(1747441990.537:256): prog-id=40 op=LOAD May 17 00:33:10.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.544000 audit: BPF prog-id=41 op=LOAD May 17 00:33:10.544000 audit: BPF prog-id=24 op=UNLOAD May 17 00:33:10.544000 audit: BPF prog-id=25 op=UNLOAD May 17 00:33:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit: BPF prog-id=42 op=LOAD May 17 00:33:10.547000 audit: BPF prog-id=35 op=UNLOAD May 17 00:33:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit: BPF prog-id=43 op=LOAD May 17 00:33:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit: BPF prog-id=44 op=LOAD May 17 00:33:10.557000 audit: BPF prog-id=36 op=UNLOAD May 17 00:33:10.557000 audit: BPF prog-id=37 op=UNLOAD May 17 00:33:10.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit: BPF prog-id=45 op=LOAD May 17 00:33:10.561000 audit: BPF prog-id=26 op=UNLOAD May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit: BPF prog-id=46 op=LOAD May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.561000 audit: BPF prog-id=47 op=LOAD May 17 00:33:10.561000 audit: BPF prog-id=27 op=UNLOAD May 17 00:33:10.561000 audit: BPF prog-id=28 op=UNLOAD May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit: BPF prog-id=48 op=LOAD May 17 00:33:10.564000 audit: BPF prog-id=34 op=UNLOAD May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.565000 audit: BPF prog-id=49 op=LOAD May 17 00:33:10.565000 audit: BPF prog-id=38 op=UNLOAD May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit: BPF prog-id=50 op=LOAD May 17 00:33:10.566000 audit: BPF prog-id=29 op=UNLOAD May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit: BPF prog-id=51 op=LOAD May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.566000 audit: BPF prog-id=52 op=LOAD May 17 00:33:10.566000 audit: BPF prog-id=30 op=UNLOAD May 17 00:33:10.566000 audit: BPF prog-id=31 op=UNLOAD May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit: BPF prog-id=53 op=LOAD May 17 00:33:10.567000 audit: BPF prog-id=33 op=UNLOAD May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:10.568000 audit: BPF prog-id=54 op=LOAD May 17 00:33:10.568000 audit: BPF prog-id=32 op=UNLOAD May 17 00:33:10.580267 systemd[1]: Started kubelet.service. May 17 00:33:10.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:10.581864 systemd[1]: Stopping kubelet.service... May 17 00:33:10.582294 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:33:10.582462 systemd[1]: Stopped kubelet.service. May 17 00:33:10.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:10.583944 systemd[1]: Starting kubelet.service... May 17 00:33:10.681016 systemd[1]: Started kubelet.service. May 17 00:33:10.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:10.718993 kubelet[1612]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:10.719511 kubelet[1612]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:33:10.719511 kubelet[1612]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:10.719511 kubelet[1612]: I0517 00:33:10.719450 1612 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:33:11.207878 kubelet[1612]: I0517 00:33:11.207760 1612 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:33:11.207878 kubelet[1612]: I0517 00:33:11.207798 1612 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:33:11.208062 kubelet[1612]: I0517 00:33:11.208047 1612 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:33:11.239052 kubelet[1612]: E0517 00:33:11.238941 1612 certificate_manager.go:596] "Failed while requesting a signed certificate from the control plane" err="cannot create certificate signing request: Post \"https://10.0.0.66:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="kubernetes.io/kube-apiserver-client-kubelet.UnhandledError" May 17 00:33:11.242009 kubelet[1612]: I0517 00:33:11.241856 1612 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:33:11.249195 kubelet[1612]: E0517 00:33:11.249153 1612 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:33:11.249195 kubelet[1612]: I0517 00:33:11.249199 1612 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:33:11.253725 kubelet[1612]: I0517 00:33:11.253697 1612 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:33:11.253950 kubelet[1612]: I0517 00:33:11.253906 1612 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:33:11.254116 kubelet[1612]: I0517 00:33:11.253939 1612 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:33:11.254223 kubelet[1612]: I0517 00:33:11.254117 1612 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:33:11.254223 kubelet[1612]: I0517 00:33:11.254126 1612 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:33:11.254295 kubelet[1612]: I0517 00:33:11.254278 1612 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:11.261026 kubelet[1612]: I0517 00:33:11.260983 1612 kubelet.go:480] "Attempting to sync node with API server" May 17 00:33:11.261026 kubelet[1612]: I0517 00:33:11.261022 1612 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:33:11.261130 kubelet[1612]: I0517 00:33:11.261052 1612 kubelet.go:386] "Adding apiserver pod source" May 17 00:33:11.266253 kubelet[1612]: I0517 00:33:11.266221 1612 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:33:11.280401 kubelet[1612]: E0517 00:33:11.280352 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.0.0.66:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:33:11.286886 kubelet[1612]: E0517 00:33:11.286833 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.0.0.66:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:33:11.289969 kubelet[1612]: I0517 00:33:11.289927 1612 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:33:11.290517 kubelet[1612]: I0517 00:33:11.290494 1612 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:33:11.291045 kubelet[1612]: W0517 00:33:11.291025 1612 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:33:11.292970 kubelet[1612]: I0517 00:33:11.292953 1612 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:33:11.293027 kubelet[1612]: I0517 00:33:11.292992 1612 server.go:1289] "Started kubelet" May 17 00:33:11.293077 kubelet[1612]: I0517 00:33:11.293044 1612 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:33:11.293605 kubelet[1612]: I0517 00:33:11.293307 1612 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:33:11.294222 kubelet[1612]: I0517 00:33:11.293728 1612 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:33:11.294222 kubelet[1612]: I0517 00:33:11.294032 1612 server.go:317] "Adding debug handlers to kubelet server" May 17 00:33:11.293000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:11.293000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:11.293000 audit[1612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00060ea80 a1=c00045ef18 a2=c00060ea50 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.293000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:11.293000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:11.293000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:11.293000 audit[1612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000192de0 a1=c00045ef30 a2=c00060eb10 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.293000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:11.295104 kubelet[1612]: I0517 00:33:11.294730 1612 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:33:11.295104 kubelet[1612]: I0517 00:33:11.294815 1612 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:33:11.295104 kubelet[1612]: I0517 00:33:11.294897 1612 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:33:11.295211 kubelet[1612]: I0517 00:33:11.295151 1612 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:33:11.297401 kubelet[1612]: E0517 00:33:11.297281 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:11.297401 kubelet[1612]: I0517 00:33:11.297318 1612 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:33:11.297521 kubelet[1612]: I0517 00:33:11.297495 1612 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:33:11.297582 kubelet[1612]: I0517 00:33:11.297545 1612 reconciler.go:26] "Reconciler: start to sync state" May 17 00:33:11.297990 kubelet[1612]: E0517 00:33:11.297963 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.0.0.66:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:33:11.298145 kubelet[1612]: I0517 00:33:11.298120 1612 factory.go:223] Registration of the systemd container factory successfully May 17 00:33:11.299267 kubelet[1612]: E0517 00:33:11.299241 1612 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:33:11.299330 kubelet[1612]: I0517 00:33:11.299310 1612 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:33:11.298000 audit[1629]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.298000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffff9b5f1e0 a2=0 a3=7ffff9b5f1cc items=0 ppid=1612 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.298000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:33:11.299912 kubelet[1612]: E0517 00:33:11.299886 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="200ms" May 17 00:33:11.299000 audit[1630]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.299000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5e65f410 a2=0 a3=7ffc5e65f3fc items=0 ppid=1612 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.299000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:33:11.301303 kubelet[1612]: E0517 00:33:11.299036 1612 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.66:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.66:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1840293b949e5d16 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-17 00:33:11.292968214 +0000 UTC m=+0.608051122,LastTimestamp:2025-05-17 00:33:11.292968214 +0000 UTC m=+0.608051122,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 17 00:33:11.301673 kubelet[1612]: I0517 00:33:11.301645 1612 factory.go:223] Registration of the containerd container factory successfully May 17 00:33:11.301000 audit[1632]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.301000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd5eaac240 a2=0 a3=7ffd5eaac22c items=0 ppid=1612 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.301000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:11.303000 audit[1634]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.303000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5165f460 a2=0 a3=7ffe5165f44c items=0 ppid=1612 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:11.308000 audit[1638]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1638 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.308000 audit[1638]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff2638c8f0 a2=0 a3=7fff2638c8dc items=0 ppid=1612 pid=1638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.308000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:33:11.310384 kubelet[1612]: I0517 00:33:11.310347 1612 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:33:11.309000 audit[1640]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1640 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:11.309000 audit[1640]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffee7287030 a2=0 a3=7ffee728701c items=0 ppid=1612 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:33:11.311407 kubelet[1612]: I0517 00:33:11.311388 1612 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:33:11.311491 kubelet[1612]: I0517 00:33:11.311477 1612 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:33:11.311592 kubelet[1612]: I0517 00:33:11.311577 1612 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:33:11.311696 kubelet[1612]: I0517 00:33:11.311680 1612 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:33:11.311870 kubelet[1612]: E0517 00:33:11.311817 1612 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:33:11.311000 audit[1642]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1642 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:11.311000 audit[1642]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8cca0950 a2=0 a3=7ffc8cca093c items=0 ppid=1612 pid=1642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.311000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:33:11.312000 audit[1643]: NETFILTER_CFG table=nat:33 family=10 entries=2 op=nft_register_chain pid=1643 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:11.312000 audit[1643]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd89f95560 a2=0 a3=7ffd89f9554c items=0 ppid=1612 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:33:11.313655 kubelet[1612]: E0517 00:33:11.313592 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.0.0.66:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:33:11.312000 audit[1644]: NETFILTER_CFG table=filter:34 family=10 entries=2 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:11.312000 audit[1644]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe86475430 a2=0 a3=7ffe8647541c items=0 ppid=1612 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.312000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:33:11.313000 audit[1645]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.313000 audit[1645]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe16c40c50 a2=0 a3=7ffe16c40c3c items=0 ppid=1612 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.313000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:33:11.314760 kubelet[1612]: I0517 00:33:11.314639 1612 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:33:11.314760 kubelet[1612]: I0517 00:33:11.314648 1612 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:33:11.314760 kubelet[1612]: I0517 00:33:11.314664 1612 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:11.314000 audit[1646]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.314000 audit[1646]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff59e86220 a2=0 a3=7fff59e8620c items=0 ppid=1612 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.314000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:33:11.315000 audit[1647]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:11.315000 audit[1647]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb9eddd20 a2=0 a3=7ffdb9eddd0c items=0 ppid=1612 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.315000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:33:11.397874 kubelet[1612]: E0517 00:33:11.397798 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:11.412291 kubelet[1612]: E0517 00:33:11.412252 1612 kubelet.go:2460] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:33:11.498649 kubelet[1612]: E0517 00:33:11.498526 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:11.501112 kubelet[1612]: E0517 00:33:11.501075 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="400ms" May 17 00:33:11.599595 kubelet[1612]: E0517 00:33:11.599535 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:11.612793 kubelet[1612]: E0517 00:33:11.612758 1612 kubelet.go:2460] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:33:11.700284 kubelet[1612]: E0517 00:33:11.700221 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:11.726666 kubelet[1612]: I0517 00:33:11.726614 1612 policy_none.go:49] "None policy: Start" May 17 00:33:11.726666 kubelet[1612]: I0517 00:33:11.726650 1612 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:33:11.726666 kubelet[1612]: I0517 00:33:11.726664 1612 state_mem.go:35] "Initializing new in-memory state store" May 17 00:33:11.731246 systemd[1]: Created slice kubepods.slice. May 17 00:33:11.735120 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:33:11.737491 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:33:11.745914 kubelet[1612]: E0517 00:33:11.745870 1612 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:33:11.744000 audit[1612]: AVC avc: denied { mac_admin } for pid=1612 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:11.744000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:11.744000 audit[1612]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000accb40 a1=c000b49cb0 a2=c000accb10 a3=25 items=0 ppid=1 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:11.744000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:11.746201 kubelet[1612]: E0517 00:33:11.745990 1612 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:33:11.746201 kubelet[1612]: I0517 00:33:11.746109 1612 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:33:11.746201 kubelet[1612]: I0517 00:33:11.746121 1612 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:33:11.746884 kubelet[1612]: I0517 00:33:11.746511 1612 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:33:11.749769 kubelet[1612]: E0517 00:33:11.749326 1612 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:33:11.749769 kubelet[1612]: E0517 00:33:11.749385 1612 eviction_manager.go:292] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 17 00:33:11.847400 kubelet[1612]: I0517 00:33:11.847352 1612 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:33:11.847729 kubelet[1612]: E0517 00:33:11.847703 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" May 17 00:33:11.901490 kubelet[1612]: E0517 00:33:11.901450 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="800ms" May 17 00:33:12.020704 systemd[1]: Created slice kubepods-burstable-pode45f7aa1fb325a6d644d7010caf0c3cb.slice. May 17 00:33:12.025650 kubelet[1612]: E0517 00:33:12.025622 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:12.028696 systemd[1]: Created slice kubepods-burstable-pod97963c41ada533e2e0872a518ecd4611.slice. May 17 00:33:12.033910 kubelet[1612]: E0517 00:33:12.033884 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:12.035818 systemd[1]: Created slice kubepods-burstable-pod8fba52155e63f70cc922ab7cc8c200fd.slice. May 17 00:33:12.036884 kubelet[1612]: E0517 00:33:12.036857 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:12.048518 kubelet[1612]: I0517 00:33:12.048502 1612 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:33:12.048808 kubelet[1612]: E0517 00:33:12.048789 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" May 17 00:33:12.102389 kubelet[1612]: I0517 00:33:12.102334 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:12.102389 kubelet[1612]: I0517 00:33:12.102388 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e45f7aa1fb325a6d644d7010caf0c3cb-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e45f7aa1fb325a6d644d7010caf0c3cb\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:12.102389 kubelet[1612]: I0517 00:33:12.102412 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e45f7aa1fb325a6d644d7010caf0c3cb-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e45f7aa1fb325a6d644d7010caf0c3cb\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:12.102621 kubelet[1612]: I0517 00:33:12.102430 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e45f7aa1fb325a6d644d7010caf0c3cb-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e45f7aa1fb325a6d644d7010caf0c3cb\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:12.102621 kubelet[1612]: I0517 00:33:12.102453 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:12.102621 kubelet[1612]: I0517 00:33:12.102472 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:12.102621 kubelet[1612]: I0517 00:33:12.102512 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:12.102621 kubelet[1612]: I0517 00:33:12.102550 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8fba52155e63f70cc922ab7cc8c200fd-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8fba52155e63f70cc922ab7cc8c200fd\") " pod="kube-system/kube-scheduler-localhost" May 17 00:33:12.102802 kubelet[1612]: I0517 00:33:12.102568 1612 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:12.175054 kubelet[1612]: E0517 00:33:12.175004 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.Node: Get \"https://10.0.0.66:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Node" May 17 00:33:12.326624 kubelet[1612]: E0517 00:33:12.326519 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:12.327327 env[1214]: time="2025-05-17T00:33:12.327038827Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e45f7aa1fb325a6d644d7010caf0c3cb,Namespace:kube-system,Attempt:0,}" May 17 00:33:12.334718 kubelet[1612]: E0517 00:33:12.334688 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:12.335198 env[1214]: time="2025-05-17T00:33:12.335129979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:97963c41ada533e2e0872a518ecd4611,Namespace:kube-system,Attempt:0,}" May 17 00:33:12.337314 kubelet[1612]: E0517 00:33:12.337283 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:12.337665 env[1214]: time="2025-05-17T00:33:12.337625301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8fba52155e63f70cc922ab7cc8c200fd,Namespace:kube-system,Attempt:0,}" May 17 00:33:12.386208 kubelet[1612]: E0517 00:33:12.386161 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.Service: Get \"https://10.0.0.66:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.Service" May 17 00:33:12.450247 kubelet[1612]: I0517 00:33:12.450216 1612 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:33:12.450635 kubelet[1612]: E0517 00:33:12.450597 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" May 17 00:33:12.570734 kubelet[1612]: E0517 00:33:12.570696 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.RuntimeClass: Get \"https://10.0.0.66:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.RuntimeClass" May 17 00:33:12.653097 kubelet[1612]: E0517 00:33:12.652978 1612 reflector.go:200] "Failed to watch" err="failed to list *v1.CSIDriver: Get \"https://10.0.0.66:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.66:6443: connect: connection refused" logger="UnhandledError" reflector="k8s.io/client-go/informers/factory.go:160" type="*v1.CSIDriver" May 17 00:33:12.701937 kubelet[1612]: E0517 00:33:12.701901 1612 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.66:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.66:6443: connect: connection refused" interval="1.6s" May 17 00:33:13.002080 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount626084822.mount: Deactivated successfully. May 17 00:33:13.008313 env[1214]: time="2025-05-17T00:33:13.008251299Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.012011 env[1214]: time="2025-05-17T00:33:13.011971128Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.014777 env[1214]: time="2025-05-17T00:33:13.014736050Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.016531 env[1214]: time="2025-05-17T00:33:13.016497246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.017483 env[1214]: time="2025-05-17T00:33:13.017440861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.019201 env[1214]: time="2025-05-17T00:33:13.019165019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.020352 env[1214]: time="2025-05-17T00:33:13.020316850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.021991 env[1214]: time="2025-05-17T00:33:13.021945662Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.023342 env[1214]: time="2025-05-17T00:33:13.023322704Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.024615 env[1214]: time="2025-05-17T00:33:13.024580748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.025994 env[1214]: time="2025-05-17T00:33:13.025959926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.031405 env[1214]: time="2025-05-17T00:33:13.031362871Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:13.054255 env[1214]: time="2025-05-17T00:33:13.054119257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:13.054457 env[1214]: time="2025-05-17T00:33:13.054427901Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:13.054564 env[1214]: time="2025-05-17T00:33:13.054538485Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:13.056060 env[1214]: time="2025-05-17T00:33:13.055972268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/543c201da0fc448a612f1fdfcfb19c3ae44b889a86e944e59657e968aca2a513 pid=1661 runtime=io.containerd.runc.v2 May 17 00:33:13.061424 env[1214]: time="2025-05-17T00:33:13.061354398Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:13.061594 env[1214]: time="2025-05-17T00:33:13.061390325Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:13.061594 env[1214]: time="2025-05-17T00:33:13.061400452Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:13.061594 env[1214]: time="2025-05-17T00:33:13.061528703Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3ea51e8c031e204ac3764fd0e1e564ab48ed100901a98aed6253484df787eaa4 pid=1676 runtime=io.containerd.runc.v2 May 17 00:33:13.068998 env[1214]: time="2025-05-17T00:33:13.068894413Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:13.069242 env[1214]: time="2025-05-17T00:33:13.069210736Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:13.069391 env[1214]: time="2025-05-17T00:33:13.069364867Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:13.070151 systemd[1]: Started cri-containerd-543c201da0fc448a612f1fdfcfb19c3ae44b889a86e944e59657e968aca2a513.scope. May 17 00:33:13.070969 env[1214]: time="2025-05-17T00:33:13.069619707Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc8b31ef931b59e7d34b9f40032b6a7a0052d67b6c4a72a772a2a8d2dec69270 pid=1692 runtime=io.containerd.runc.v2 May 17 00:33:13.075542 systemd[1]: Started cri-containerd-3ea51e8c031e204ac3764fd0e1e564ab48ed100901a98aed6253484df787eaa4.scope. May 17 00:33:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.079000 audit: BPF prog-id=55 op=LOAD May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1661 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534336332303164613066633434386136313266316664666366623139 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=1661 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534336332303164613066633434386136313266316664666366623139 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit: BPF prog-id=56 op=LOAD May 17 00:33:13.080000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000024380 items=0 ppid=1661 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534336332303164613066633434386136313266316664666366623139 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit: BPF prog-id=57 op=LOAD May 17 00:33:13.080000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0000243c8 items=0 ppid=1661 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534336332303164613066633434386136313266316664666366623139 May 17 00:33:13.080000 audit: BPF prog-id=57 op=UNLOAD May 17 00:33:13.080000 audit: BPF prog-id=56 op=UNLOAD May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { perfmon } for pid=1680 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit[1680]: AVC avc: denied { bpf } for pid=1680 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.080000 audit: BPF prog-id=58 op=LOAD May 17 00:33:13.080000 audit[1680]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0000247d8 items=0 ppid=1661 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534336332303164613066633434386136313266316664666366623139 May 17 00:33:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit: BPF prog-id=59 op=LOAD May 17 00:33:13.089000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=1676 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613531653863303331653230346163333736346664306531653536 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=1676 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613531653863303331653230346163333736346664306531653536 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.089000 audit: BPF prog-id=60 op=LOAD May 17 00:33:13.089000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019f9d8 a2=78 a3=c0003263c0 items=0 ppid=1676 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613531653863303331653230346163333736346664306531653536 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit: BPF prog-id=61 op=LOAD May 17 00:33:13.090000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00019f770 a2=78 a3=c000326408 items=0 ppid=1676 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613531653863303331653230346163333736346664306531653536 May 17 00:33:13.090000 audit: BPF prog-id=61 op=UNLOAD May 17 00:33:13.090000 audit: BPF prog-id=60 op=UNLOAD May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.090000 audit: BPF prog-id=62 op=LOAD May 17 00:33:13.090000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00019fc30 a2=78 a3=c000326818 items=0 ppid=1676 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365613531653863303331653230346163333736346664306531653536 May 17 00:33:13.093393 systemd[1]: Started cri-containerd-bc8b31ef931b59e7d34b9f40032b6a7a0052d67b6c4a72a772a2a8d2dec69270.scope. May 17 00:33:13.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.107000 audit: BPF prog-id=63 op=LOAD May 17 00:33:13.109000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1692 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263386233316566393331623539653764333462396634303033326236 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1692 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263386233316566393331623539653764333462396634303033326236 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.109000 audit: BPF prog-id=64 op=LOAD May 17 00:33:13.109000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d4c00 items=0 ppid=1692 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263386233316566393331623539653764333462396634303033326236 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.110000 audit: BPF prog-id=65 op=LOAD May 17 00:33:13.110000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d4c48 items=0 ppid=1692 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263386233316566393331623539653764333462396634303033326236 May 17 00:33:13.111000 audit: BPF prog-id=65 op=UNLOAD May 17 00:33:13.111000 audit: BPF prog-id=64 op=UNLOAD May 17 00:33:13.111000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { perfmon } for pid=1731 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit[1731]: AVC avc: denied { bpf } for pid=1731 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.111000 audit: BPF prog-id=66 op=LOAD May 17 00:33:13.111000 audit[1731]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d5058 items=0 ppid=1692 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263386233316566393331623539653764333462396634303033326236 May 17 00:33:13.114857 env[1214]: time="2025-05-17T00:33:13.114824126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:97963c41ada533e2e0872a518ecd4611,Namespace:kube-system,Attempt:0,} returns sandbox id \"543c201da0fc448a612f1fdfcfb19c3ae44b889a86e944e59657e968aca2a513\"" May 17 00:33:13.116061 kubelet[1612]: E0517 00:33:13.115863 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:13.118277 env[1214]: time="2025-05-17T00:33:13.117615809Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:e45f7aa1fb325a6d644d7010caf0c3cb,Namespace:kube-system,Attempt:0,} returns sandbox id \"3ea51e8c031e204ac3764fd0e1e564ab48ed100901a98aed6253484df787eaa4\"" May 17 00:33:13.118415 kubelet[1612]: E0517 00:33:13.118378 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:13.120783 env[1214]: time="2025-05-17T00:33:13.120743920Z" level=info msg="CreateContainer within sandbox \"543c201da0fc448a612f1fdfcfb19c3ae44b889a86e944e59657e968aca2a513\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:33:13.122794 env[1214]: time="2025-05-17T00:33:13.122763494Z" level=info msg="CreateContainer within sandbox \"3ea51e8c031e204ac3764fd0e1e564ab48ed100901a98aed6253484df787eaa4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:33:13.134640 env[1214]: time="2025-05-17T00:33:13.134597237Z" level=info msg="CreateContainer within sandbox \"543c201da0fc448a612f1fdfcfb19c3ae44b889a86e944e59657e968aca2a513\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"12fda09bd2269746f604ea2ff4504bbcaddd46d2b406a04fecf3e29fb1494721\"" May 17 00:33:13.135056 env[1214]: time="2025-05-17T00:33:13.135031334Z" level=info msg="StartContainer for \"12fda09bd2269746f604ea2ff4504bbcaddd46d2b406a04fecf3e29fb1494721\"" May 17 00:33:13.142808 env[1214]: time="2025-05-17T00:33:13.142543554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:8fba52155e63f70cc922ab7cc8c200fd,Namespace:kube-system,Attempt:0,} returns sandbox id \"bc8b31ef931b59e7d34b9f40032b6a7a0052d67b6c4a72a772a2a8d2dec69270\"" May 17 00:33:13.144026 env[1214]: time="2025-05-17T00:33:13.143978299Z" level=info msg="CreateContainer within sandbox \"3ea51e8c031e204ac3764fd0e1e564ab48ed100901a98aed6253484df787eaa4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b12f154c6328535f426593b34b646b4a589d51bd913bde5b043bd07e71a1c346\"" May 17 00:33:13.144865 env[1214]: time="2025-05-17T00:33:13.144838774Z" level=info msg="StartContainer for \"b12f154c6328535f426593b34b646b4a589d51bd913bde5b043bd07e71a1c346\"" May 17 00:33:13.145258 kubelet[1612]: E0517 00:33:13.145059 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:13.149354 env[1214]: time="2025-05-17T00:33:13.149316292Z" level=info msg="CreateContainer within sandbox \"bc8b31ef931b59e7d34b9f40032b6a7a0052d67b6c4a72a772a2a8d2dec69270\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:33:13.151390 systemd[1]: Started cri-containerd-12fda09bd2269746f604ea2ff4504bbcaddd46d2b406a04fecf3e29fb1494721.scope. May 17 00:33:13.165596 systemd[1]: Started cri-containerd-b12f154c6328535f426593b34b646b4a589d51bd913bde5b043bd07e71a1c346.scope. May 17 00:33:13.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.167000 audit: BPF prog-id=67 op=LOAD May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1661 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132666461303962643232363937343666363034656132666634353034 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1661 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132666461303962643232363937343666363034656132666634353034 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit: BPF prog-id=68 op=LOAD May 17 00:33:13.168000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021f2f0 items=0 ppid=1661 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132666461303962643232363937343666363034656132666634353034 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit: BPF prog-id=69 op=LOAD May 17 00:33:13.168000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021f338 items=0 ppid=1661 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132666461303962643232363937343666363034656132666634353034 May 17 00:33:13.168000 audit: BPF prog-id=69 op=UNLOAD May 17 00:33:13.168000 audit: BPF prog-id=68 op=UNLOAD May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { perfmon } for pid=1783 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit[1783]: AVC avc: denied { bpf } for pid=1783 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.168000 audit: BPF prog-id=70 op=LOAD May 17 00:33:13.168000 audit[1783]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021f748 items=0 ppid=1661 pid=1783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132666461303962643232363937343666363034656132666634353034 May 17 00:33:13.171116 env[1214]: time="2025-05-17T00:33:13.171077424Z" level=info msg="CreateContainer within sandbox \"bc8b31ef931b59e7d34b9f40032b6a7a0052d67b6c4a72a772a2a8d2dec69270\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"08634ae1a1181879643cc19163eb01f7ee94564ab15e6aad44fb1c4fda251622\"" May 17 00:33:13.171811 env[1214]: time="2025-05-17T00:33:13.171643173Z" level=info msg="StartContainer for \"08634ae1a1181879643cc19163eb01f7ee94564ab15e6aad44fb1c4fda251622\"" May 17 00:33:13.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.181000 audit: BPF prog-id=71 op=LOAD May 17 00:33:13.181000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.181000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1676 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326631353463363332383533356634323635393362333462363436 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1676 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326631353463363332383533356634323635393362333462363436 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit: BPF prog-id=72 op=LOAD May 17 00:33:13.182000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028b7e0 items=0 ppid=1676 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326631353463363332383533356634323635393362333462363436 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit: BPF prog-id=73 op=LOAD May 17 00:33:13.182000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028b828 items=0 ppid=1676 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326631353463363332383533356634323635393362333462363436 May 17 00:33:13.182000 audit: BPF prog-id=73 op=UNLOAD May 17 00:33:13.182000 audit: BPF prog-id=72 op=UNLOAD May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.182000 audit: BPF prog-id=74 op=LOAD May 17 00:33:13.182000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028bc38 items=0 ppid=1676 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6231326631353463363332383533356634323635393362333462363436 May 17 00:33:13.192100 systemd[1]: Started cri-containerd-08634ae1a1181879643cc19163eb01f7ee94564ab15e6aad44fb1c4fda251622.scope. May 17 00:33:13.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit: BPF prog-id=75 op=LOAD May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1692 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363334616531613131383138373936343363633139313633656230 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1692 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363334616531613131383138373936343363633139313633656230 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit: BPF prog-id=76 op=LOAD May 17 00:33:13.203000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003f0d40 items=0 ppid=1692 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363334616531613131383138373936343363633139313633656230 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.203000 audit: BPF prog-id=77 op=LOAD May 17 00:33:13.203000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003f0d88 items=0 ppid=1692 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363334616531613131383138373936343363633139313633656230 May 17 00:33:13.203000 audit: BPF prog-id=77 op=UNLOAD May 17 00:33:13.204000 audit: BPF prog-id=76 op=UNLOAD May 17 00:33:13.204000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { perfmon } for pid=1834 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit[1834]: AVC avc: denied { bpf } for pid=1834 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:13.204000 audit: BPF prog-id=78 op=LOAD May 17 00:33:13.204000 audit[1834]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003f1198 items=0 ppid=1692 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:13.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038363334616531613131383138373936343363633139313633656230 May 17 00:33:13.214552 env[1214]: time="2025-05-17T00:33:13.214514200Z" level=info msg="StartContainer for \"12fda09bd2269746f604ea2ff4504bbcaddd46d2b406a04fecf3e29fb1494721\" returns successfully" May 17 00:33:13.222842 env[1214]: time="2025-05-17T00:33:13.222788352Z" level=info msg="StartContainer for \"b12f154c6328535f426593b34b646b4a589d51bd913bde5b043bd07e71a1c346\" returns successfully" May 17 00:33:13.234123 env[1214]: time="2025-05-17T00:33:13.234068999Z" level=info msg="StartContainer for \"08634ae1a1181879643cc19163eb01f7ee94564ab15e6aad44fb1c4fda251622\" returns successfully" May 17 00:33:13.251656 kubelet[1612]: I0517 00:33:13.251626 1612 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:33:13.251980 kubelet[1612]: E0517 00:33:13.251949 1612 kubelet_node_status.go:107] "Unable to register node with API server" err="Post \"https://10.0.0.66:6443/api/v1/nodes\": dial tcp 10.0.0.66:6443: connect: connection refused" node="localhost" May 17 00:33:13.320304 kubelet[1612]: E0517 00:33:13.320111 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:13.320304 kubelet[1612]: E0517 00:33:13.320304 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:13.328020 kubelet[1612]: E0517 00:33:13.327986 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:13.328191 kubelet[1612]: E0517 00:33:13.328105 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:13.329452 kubelet[1612]: E0517 00:33:13.329424 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:13.329519 kubelet[1612]: E0517 00:33:13.329497 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:14.331696 kubelet[1612]: E0517 00:33:14.331641 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:14.332214 kubelet[1612]: E0517 00:33:14.331762 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:14.332214 kubelet[1612]: E0517 00:33:14.331970 1612 kubelet.go:3305] "No need to create a mirror pod, since failed to get node info from the cluster" err="node \"localhost\" not found" node="localhost" May 17 00:33:14.332214 kubelet[1612]: E0517 00:33:14.332044 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:14.337000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.337000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=5204 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.337000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0056ba4b0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:33:14.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:14.337000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0013fd2c0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:33:14.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:14.337000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.337000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0039fbb00 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:33:14.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:14.349000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.349000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c0050fa3a0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:33:14.349000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:14.350000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.350000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=85 a1=c0038b6690 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:33:14.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:14.353000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.353000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8e a1=c0039fbf50 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:33:14.353000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:14.393835 kubelet[1612]: E0517 00:33:14.393797 1612 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 17 00:33:14.549000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.549000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000d4a390 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:14.549000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:14.550000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:14.550000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000184de0 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:14.550000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:14.780195 kubelet[1612]: E0517 00:33:14.780065 1612 csi_plugin.go:397] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found May 17 00:33:14.853029 kubelet[1612]: I0517 00:33:14.853003 1612 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:33:14.857410 kubelet[1612]: I0517 00:33:14.857357 1612 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 17 00:33:14.857410 kubelet[1612]: E0517 00:33:14.857389 1612 kubelet_node_status.go:548] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 17 00:33:14.864692 kubelet[1612]: E0517 00:33:14.864658 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:14.965509 kubelet[1612]: E0517 00:33:14.965460 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:15.066449 kubelet[1612]: E0517 00:33:15.066284 1612 kubelet_node_status.go:466] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:15.200043 kubelet[1612]: I0517 00:33:15.199987 1612 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:33:15.206710 kubelet[1612]: E0517 00:33:15.206661 1612 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" May 17 00:33:15.206710 kubelet[1612]: I0517 00:33:15.206694 1612 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:15.208428 kubelet[1612]: E0517 00:33:15.208379 1612 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:15.208428 kubelet[1612]: I0517 00:33:15.208420 1612 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:33:15.209665 kubelet[1612]: E0517 00:33:15.209642 1612 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" May 17 00:33:15.273060 kubelet[1612]: I0517 00:33:15.273022 1612 apiserver.go:52] "Watching apiserver" May 17 00:33:15.298555 kubelet[1612]: I0517 00:33:15.298499 1612 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:33:16.509248 kubelet[1612]: I0517 00:33:16.509210 1612 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:16.515968 kubelet[1612]: E0517 00:33:16.515929 1612 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:16.636143 systemd[1]: Reloading. May 17 00:33:16.714991 /usr/lib/systemd/system-generators/torcx-generator[1922]: time="2025-05-17T00:33:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:33:16.715021 /usr/lib/systemd/system-generators/torcx-generator[1922]: time="2025-05-17T00:33:16Z" level=info msg="torcx already run" May 17 00:33:17.106010 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:33:17.106027 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:33:17.126012 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:33:17.214849 kernel: kauditd_printk_skb: 579 callbacks suppressed May 17 00:33:17.215082 kernel: audit: type=1400 audit(1747441997.206:553): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215107 kernel: audit: type=1400 audit(1747441997.206:554): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.221787 kernel: audit: type=1400 audit(1747441997.206:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.221862 kernel: audit: type=1400 audit(1747441997.206:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.221888 kernel: audit: type=1400 audit(1747441997.206:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.225258 kernel: audit: type=1400 audit(1747441997.206:558): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.228428 kernel: audit: type=1400 audit(1747441997.206:559): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.231688 kernel: audit: type=1400 audit(1747441997.206:560): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234953 kernel: audit: type=1400 audit(1747441997.210:561): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238126 kernel: audit: type=1334 audit(1747441997.210:562): prog-id=79 op=LOAD May 17 00:33:17.210000 audit: BPF prog-id=79 op=LOAD May 17 00:33:17.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.213000 audit: BPF prog-id=80 op=LOAD May 17 00:33:17.213000 audit: BPF prog-id=40 op=UNLOAD May 17 00:33:17.213000 audit: BPF prog-id=41 op=UNLOAD May 17 00:33:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit: BPF prog-id=81 op=LOAD May 17 00:33:17.220000 audit: BPF prog-id=42 op=UNLOAD May 17 00:33:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit: BPF prog-id=82 op=LOAD May 17 00:33:17.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.233000 audit: BPF prog-id=83 op=LOAD May 17 00:33:17.233000 audit: BPF prog-id=43 op=UNLOAD May 17 00:33:17.233000 audit: BPF prog-id=44 op=UNLOAD May 17 00:33:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit: BPF prog-id=84 op=LOAD May 17 00:33:17.238000 audit: BPF prog-id=45 op=UNLOAD May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit: BPF prog-id=85 op=LOAD May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.238000 audit: BPF prog-id=86 op=LOAD May 17 00:33:17.238000 audit: BPF prog-id=46 op=UNLOAD May 17 00:33:17.238000 audit: BPF prog-id=47 op=UNLOAD May 17 00:33:17.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.240000 audit: BPF prog-id=87 op=LOAD May 17 00:33:17.240000 audit: BPF prog-id=55 op=UNLOAD May 17 00:33:17.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.242000 audit: BPF prog-id=88 op=LOAD May 17 00:33:17.242000 audit: BPF prog-id=63 op=UNLOAD May 17 00:33:17.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.243000 audit: BPF prog-id=89 op=LOAD May 17 00:33:17.244000 audit: BPF prog-id=48 op=UNLOAD May 17 00:33:17.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit: BPF prog-id=90 op=LOAD May 17 00:33:17.246000 audit: BPF prog-id=67 op=UNLOAD May 17 00:33:17.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.246000 audit: BPF prog-id=91 op=LOAD May 17 00:33:17.246000 audit: BPF prog-id=59 op=UNLOAD May 17 00:33:17.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.247000 audit: BPF prog-id=92 op=LOAD May 17 00:33:17.247000 audit: BPF prog-id=49 op=UNLOAD May 17 00:33:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.248000 audit: BPF prog-id=93 op=LOAD May 17 00:33:17.248000 audit: BPF prog-id=75 op=UNLOAD May 17 00:33:17.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.249000 audit: BPF prog-id=94 op=LOAD May 17 00:33:17.249000 audit: BPF prog-id=71 op=UNLOAD May 17 00:33:17.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.251000 audit: BPF prog-id=95 op=LOAD May 17 00:33:17.251000 audit: BPF prog-id=50 op=UNLOAD May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit: BPF prog-id=96 op=LOAD May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.252000 audit: BPF prog-id=97 op=LOAD May 17 00:33:17.252000 audit: BPF prog-id=51 op=UNLOAD May 17 00:33:17.252000 audit: BPF prog-id=52 op=UNLOAD May 17 00:33:17.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.253000 audit: BPF prog-id=98 op=LOAD May 17 00:33:17.253000 audit: BPF prog-id=53 op=UNLOAD May 17 00:33:17.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.254000 audit: BPF prog-id=99 op=LOAD May 17 00:33:17.255000 audit: BPF prog-id=54 op=UNLOAD May 17 00:33:17.267995 systemd[1]: Stopping kubelet.service... May 17 00:33:17.301506 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:33:17.301710 systemd[1]: Stopped kubelet.service. May 17 00:33:17.301781 systemd[1]: kubelet.service: Consumed 1.022s CPU time. May 17 00:33:17.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:17.303608 systemd[1]: Starting kubelet.service... May 17 00:33:17.400553 systemd[1]: Started kubelet.service. May 17 00:33:17.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:17.450098 kubelet[1967]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:17.450098 kubelet[1967]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.35. Image garbage collector will get sandbox image information from CRI. May 17 00:33:17.450098 kubelet[1967]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:17.450546 kubelet[1967]: I0517 00:33:17.450093 1967 server.go:212] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:33:17.459769 kubelet[1967]: I0517 00:33:17.459717 1967 server.go:530] "Kubelet version" kubeletVersion="v1.33.0" May 17 00:33:17.459769 kubelet[1967]: I0517 00:33:17.459755 1967 server.go:532] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:33:17.463314 kubelet[1967]: I0517 00:33:17.463269 1967 server.go:956] "Client rotation is on, will bootstrap in background" May 17 00:33:17.464966 kubelet[1967]: I0517 00:33:17.464940 1967 certificate_store.go:147] "Loading cert/key pair from a file" filePath="/var/lib/kubelet/pki/kubelet-client-current.pem" May 17 00:33:17.467604 kubelet[1967]: I0517 00:33:17.467562 1967 dynamic_cafile_content.go:161] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:33:17.472709 kubelet[1967]: E0517 00:33:17.472669 1967 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:33:17.472931 kubelet[1967]: I0517 00:33:17.472913 1967 server.go:1423] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:33:17.476886 kubelet[1967]: I0517 00:33:17.476869 1967 server.go:782] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:33:17.477308 kubelet[1967]: I0517 00:33:17.477278 1967 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:33:17.477598 kubelet[1967]: I0517 00:33:17.477379 1967 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"MemoryManagerPolicy":"None","MemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:33:17.477747 kubelet[1967]: I0517 00:33:17.477732 1967 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:33:17.477823 kubelet[1967]: I0517 00:33:17.477809 1967 container_manager_linux.go:303] "Creating device plugin manager" May 17 00:33:17.477942 kubelet[1967]: I0517 00:33:17.477928 1967 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:17.478193 kubelet[1967]: I0517 00:33:17.478182 1967 kubelet.go:480] "Attempting to sync node with API server" May 17 00:33:17.478656 kubelet[1967]: I0517 00:33:17.478644 1967 kubelet.go:375] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:33:17.478750 kubelet[1967]: I0517 00:33:17.478736 1967 kubelet.go:386] "Adding apiserver pod source" May 17 00:33:17.478839 kubelet[1967]: I0517 00:33:17.478825 1967 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:33:17.481254 kubelet[1967]: I0517 00:33:17.481237 1967 kuberuntime_manager.go:279] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:33:17.481780 kubelet[1967]: I0517 00:33:17.481765 1967 kubelet.go:935] "Not starting ClusterTrustBundle informer because we are in static kubelet mode or the ClusterTrustBundleProjection featuregate is disabled" May 17 00:33:17.487818 kubelet[1967]: I0517 00:33:17.487802 1967 watchdog_linux.go:99] "Systemd watchdog is not enabled" May 17 00:33:17.487949 kubelet[1967]: I0517 00:33:17.487936 1967 server.go:1289] "Started kubelet" May 17 00:33:17.488000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.488000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:17.488000 audit[1967]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c4d440 a1=c000386e70 a2=c000c4d410 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:17.488000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:17.488000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.488000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:17.488000 audit[1967]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c6c8e0 a1=c000386e88 a2=c000c4d4d0 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:17.488000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:17.490445 kubelet[1967]: I0517 00:33:17.489881 1967 kubelet.go:1552] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:33:17.490445 kubelet[1967]: I0517 00:33:17.489926 1967 kubelet.go:1556] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/plugins: invalid argument" May 17 00:33:17.490445 kubelet[1967]: I0517 00:33:17.489965 1967 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:33:17.495392 kubelet[1967]: I0517 00:33:17.495332 1967 server.go:180] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:33:17.497017 kubelet[1967]: I0517 00:33:17.496468 1967 server.go:317] "Adding debug handlers to kubelet server" May 17 00:33:17.497411 kubelet[1967]: I0517 00:33:17.497352 1967 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:33:17.497650 kubelet[1967]: I0517 00:33:17.497627 1967 server.go:255] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:33:17.498113 kubelet[1967]: I0517 00:33:17.498087 1967 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:33:17.498623 kubelet[1967]: E0517 00:33:17.498595 1967 kubelet.go:1600] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:33:17.500058 kubelet[1967]: I0517 00:33:17.500041 1967 factory.go:223] Registration of the systemd container factory successfully May 17 00:33:17.500244 kubelet[1967]: I0517 00:33:17.500222 1967 volume_manager.go:297] "Starting Kubelet Volume Manager" May 17 00:33:17.500373 kubelet[1967]: I0517 00:33:17.500310 1967 factory.go:221] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:33:17.500567 kubelet[1967]: I0517 00:33:17.500454 1967 reconciler.go:26] "Reconciler: start to sync state" May 17 00:33:17.500745 kubelet[1967]: I0517 00:33:17.500342 1967 desired_state_of_world_populator.go:150] "Desired state populator starts to run" May 17 00:33:17.501763 kubelet[1967]: I0517 00:33:17.501752 1967 factory.go:223] Registration of the containerd container factory successfully May 17 00:33:17.507624 kubelet[1967]: I0517 00:33:17.507577 1967 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv4" May 17 00:33:17.508465 kubelet[1967]: I0517 00:33:17.508440 1967 kubelet_network_linux.go:49] "Initialized iptables rules." protocol="IPv6" May 17 00:33:17.508465 kubelet[1967]: I0517 00:33:17.508461 1967 status_manager.go:230] "Starting to sync pod status with apiserver" May 17 00:33:17.508547 kubelet[1967]: I0517 00:33:17.508482 1967 watchdog_linux.go:127] "Systemd watchdog is not enabled or the interval is invalid, so health checking will not be started." May 17 00:33:17.508547 kubelet[1967]: I0517 00:33:17.508491 1967 kubelet.go:2436] "Starting kubelet main sync loop" May 17 00:33:17.508547 kubelet[1967]: E0517 00:33:17.508534 1967 kubelet.go:2460] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:33:17.532591 kubelet[1967]: I0517 00:33:17.532555 1967 cpu_manager.go:221] "Starting CPU manager" policy="none" May 17 00:33:17.532591 kubelet[1967]: I0517 00:33:17.532573 1967 cpu_manager.go:222] "Reconciling" reconcilePeriod="10s" May 17 00:33:17.532591 kubelet[1967]: I0517 00:33:17.532591 1967 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:17.532788 kubelet[1967]: I0517 00:33:17.532713 1967 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:33:17.532788 kubelet[1967]: I0517 00:33:17.532723 1967 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:33:17.532788 kubelet[1967]: I0517 00:33:17.532739 1967 policy_none.go:49] "None policy: Start" May 17 00:33:17.532788 kubelet[1967]: I0517 00:33:17.532748 1967 memory_manager.go:186] "Starting memorymanager" policy="None" May 17 00:33:17.532788 kubelet[1967]: I0517 00:33:17.532758 1967 state_mem.go:35] "Initializing new in-memory state store" May 17 00:33:17.532907 kubelet[1967]: I0517 00:33:17.532845 1967 state_mem.go:75] "Updated machine memory state" May 17 00:33:17.538341 kubelet[1967]: E0517 00:33:17.538309 1967 manager.go:517] "Failed to read data from checkpoint" err="checkpoint is not found" checkpoint="kubelet_internal_checkpoint" May 17 00:33:17.537000 audit[1967]: AVC avc: denied { mac_admin } for pid=1967 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:17.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:17.537000 audit[1967]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f6f500 a1=c00063cfc0 a2=c000f6f4d0 a3=25 items=0 ppid=1 pid=1967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:17.537000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:17.538639 kubelet[1967]: E0517 00:33:17.538376 1967 server.go:94] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" err="setxattr(label=system_u:object_r:container_file_t:s0) /var/lib/kubelet/device-plugins/: invalid argument" path="/var/lib/kubelet/device-plugins/" May 17 00:33:17.538639 kubelet[1967]: I0517 00:33:17.538512 1967 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:33:17.538639 kubelet[1967]: I0517 00:33:17.538525 1967 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:33:17.539901 kubelet[1967]: I0517 00:33:17.539570 1967 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:33:17.539901 kubelet[1967]: E0517 00:33:17.539744 1967 eviction_manager.go:267] "eviction manager: failed to check if we have separate container filesystem. Ignoring." err="no imagefs label for configured runtime" May 17 00:33:17.609598 kubelet[1967]: I0517 00:33:17.609568 1967 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:33:17.609849 kubelet[1967]: I0517 00:33:17.609593 1967 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:33:17.610026 kubelet[1967]: I0517 00:33:17.609653 1967 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.619260 kubelet[1967]: E0517 00:33:17.619216 1967 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.645572 kubelet[1967]: I0517 00:33:17.645540 1967 kubelet_node_status.go:75] "Attempting to register node" node="localhost" May 17 00:33:17.654498 kubelet[1967]: I0517 00:33:17.654348 1967 kubelet_node_status.go:124] "Node was previously registered" node="localhost" May 17 00:33:17.654498 kubelet[1967]: I0517 00:33:17.654466 1967 kubelet_node_status.go:78] "Successfully registered node" node="localhost" May 17 00:33:17.701848 kubelet[1967]: I0517 00:33:17.701784 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.701848 kubelet[1967]: I0517 00:33:17.701831 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.701848 kubelet[1967]: I0517 00:33:17.701853 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.702080 kubelet[1967]: I0517 00:33:17.701870 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.702080 kubelet[1967]: I0517 00:33:17.701896 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/97963c41ada533e2e0872a518ecd4611-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"97963c41ada533e2e0872a518ecd4611\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.702080 kubelet[1967]: I0517 00:33:17.701913 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/8fba52155e63f70cc922ab7cc8c200fd-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"8fba52155e63f70cc922ab7cc8c200fd\") " pod="kube-system/kube-scheduler-localhost" May 17 00:33:17.702080 kubelet[1967]: I0517 00:33:17.701927 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e45f7aa1fb325a6d644d7010caf0c3cb-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"e45f7aa1fb325a6d644d7010caf0c3cb\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:17.702080 kubelet[1967]: I0517 00:33:17.701949 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e45f7aa1fb325a6d644d7010caf0c3cb-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"e45f7aa1fb325a6d644d7010caf0c3cb\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:17.702244 kubelet[1967]: I0517 00:33:17.701966 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e45f7aa1fb325a6d644d7010caf0c3cb-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"e45f7aa1fb325a6d644d7010caf0c3cb\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:17.917133 kubelet[1967]: E0517 00:33:17.916988 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:17.918815 kubelet[1967]: E0517 00:33:17.918395 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:17.919665 kubelet[1967]: E0517 00:33:17.919640 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.480938 kubelet[1967]: I0517 00:33:18.480876 1967 apiserver.go:52] "Watching apiserver" May 17 00:33:18.500899 kubelet[1967]: I0517 00:33:18.500830 1967 desired_state_of_world_populator.go:158] "Finished populating initial desired state of world" May 17 00:33:18.518761 kubelet[1967]: I0517 00:33:18.518727 1967 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:18.518930 kubelet[1967]: I0517 00:33:18.518798 1967 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-apiserver-localhost" May 17 00:33:18.519002 kubelet[1967]: I0517 00:33:18.518984 1967 kubelet.go:3309] "Creating a mirror pod for static pod" pod="kube-system/kube-scheduler-localhost" May 17 00:33:18.649568 kubelet[1967]: E0517 00:33:18.649520 1967 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:18.649737 kubelet[1967]: E0517 00:33:18.649567 1967 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 17 00:33:18.649800 kubelet[1967]: E0517 00:33:18.649755 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.649883 kubelet[1967]: E0517 00:33:18.649853 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.649971 kubelet[1967]: E0517 00:33:18.649950 1967 kubelet.go:3311] "Failed creating a mirror pod" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 17 00:33:18.650159 kubelet[1967]: E0517 00:33:18.650138 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.696288 kubelet[1967]: I0517 00:33:18.696210 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.6961149309999999 podStartE2EDuration="1.696114931s" podCreationTimestamp="2025-05-17 00:33:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:18.649450999 +0000 UTC m=+1.243515187" watchObservedRunningTime="2025-05-17 00:33:18.696114931 +0000 UTC m=+1.290179119" May 17 00:33:18.708542 kubelet[1967]: I0517 00:33:18.708475 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.708454221 podStartE2EDuration="1.708454221s" podCreationTimestamp="2025-05-17 00:33:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:18.695992076 +0000 UTC m=+1.290056274" watchObservedRunningTime="2025-05-17 00:33:18.708454221 +0000 UTC m=+1.302518409" May 17 00:33:18.708868 kubelet[1967]: I0517 00:33:18.708598 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.708593114 podStartE2EDuration="2.708593114s" podCreationTimestamp="2025-05-17 00:33:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:18.708137377 +0000 UTC m=+1.302201565" watchObservedRunningTime="2025-05-17 00:33:18.708593114 +0000 UTC m=+1.302657312" May 17 00:33:19.519463 kubelet[1967]: E0517 00:33:19.519431 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:19.519839 kubelet[1967]: E0517 00:33:19.519503 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:19.519839 kubelet[1967]: E0517 00:33:19.519618 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:20.520688 kubelet[1967]: E0517 00:33:20.520643 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:20.852000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:33:20.852000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0004f14c0 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:20.852000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:22.551000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.554257 kernel: kauditd_printk_skb: 251 callbacks suppressed May 17 00:33:22.554336 kernel: audit: type=1400 audit(1747442002.551:803): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.551000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001880c60 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:22.563547 kernel: audit: type=1300 audit(1747442002.551:803): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001880c60 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:22.563599 kernel: audit: type=1327 audit(1747442002.551:803): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:22.551000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:22.567933 kernel: audit: type=1400 audit(1747442002.553:804): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.553000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.571866 kernel: audit: type=1300 audit(1747442002.553:804): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004bf140 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:22.553000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004bf140 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:22.577164 kernel: audit: type=1327 audit(1747442002.553:804): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:22.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:22.581548 kernel: audit: type=1400 audit(1747442002.553:805): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.553000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.553000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004bf300 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:22.590762 kernel: audit: type=1300 audit(1747442002.553:805): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0004bf300 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:22.590828 kernel: audit: type=1327 audit(1747442002.553:805): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:22.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:22.553000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.598868 kernel: audit: type=1400 audit(1747442002.553:806): avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:22.553000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00192ce20 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:33:22.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:23.520899 kubelet[1967]: I0517 00:33:23.520620 1967 kuberuntime_manager.go:1746] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:33:23.522423 env[1214]: time="2025-05-17T00:33:23.521526081Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:33:23.522649 kubelet[1967]: I0517 00:33:23.521757 1967 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:33:24.374968 systemd[1]: Created slice kubepods-besteffort-podaec3a79c_505f_402c_8dfa_bf7cb6639d9b.slice. May 17 00:33:24.452401 kubelet[1967]: I0517 00:33:24.452302 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6t4km\" (UniqueName: \"kubernetes.io/projected/aec3a79c-505f-402c-8dfa-bf7cb6639d9b-kube-api-access-6t4km\") pod \"kube-proxy-6g6gj\" (UID: \"aec3a79c-505f-402c-8dfa-bf7cb6639d9b\") " pod="kube-system/kube-proxy-6g6gj" May 17 00:33:24.452401 kubelet[1967]: I0517 00:33:24.452362 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/aec3a79c-505f-402c-8dfa-bf7cb6639d9b-kube-proxy\") pod \"kube-proxy-6g6gj\" (UID: \"aec3a79c-505f-402c-8dfa-bf7cb6639d9b\") " pod="kube-system/kube-proxy-6g6gj" May 17 00:33:24.452401 kubelet[1967]: I0517 00:33:24.452390 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/aec3a79c-505f-402c-8dfa-bf7cb6639d9b-xtables-lock\") pod \"kube-proxy-6g6gj\" (UID: \"aec3a79c-505f-402c-8dfa-bf7cb6639d9b\") " pod="kube-system/kube-proxy-6g6gj" May 17 00:33:24.452658 kubelet[1967]: I0517 00:33:24.452435 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/aec3a79c-505f-402c-8dfa-bf7cb6639d9b-lib-modules\") pod \"kube-proxy-6g6gj\" (UID: \"aec3a79c-505f-402c-8dfa-bf7cb6639d9b\") " pod="kube-system/kube-proxy-6g6gj" May 17 00:33:24.560940 kubelet[1967]: I0517 00:33:24.560887 1967 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:33:24.652936 kubelet[1967]: E0517 00:33:24.652403 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:24.681632 kubelet[1967]: E0517 00:33:24.681578 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:24.682516 env[1214]: time="2025-05-17T00:33:24.682463587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6g6gj,Uid:aec3a79c-505f-402c-8dfa-bf7cb6639d9b,Namespace:kube-system,Attempt:0,}" May 17 00:33:24.712401 systemd[1]: Created slice kubepods-besteffort-pod58a660e6_9e45_4600_a99f_b7153da13ddd.slice. May 17 00:33:24.725613 env[1214]: time="2025-05-17T00:33:24.725511925Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:24.725613 env[1214]: time="2025-05-17T00:33:24.725559676Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:24.725613 env[1214]: time="2025-05-17T00:33:24.725590236Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:24.725922 env[1214]: time="2025-05-17T00:33:24.725744362Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8463719a4c0b3c345eafc90cc1b00186ef2c1ccf743803c598af4e05c8bb4834 pid=2034 runtime=io.containerd.runc.v2 May 17 00:33:24.744806 systemd[1]: Started cri-containerd-8463719a4c0b3c345eafc90cc1b00186ef2c1ccf743803c598af4e05c8bb4834.scope. May 17 00:33:24.753648 kubelet[1967]: I0517 00:33:24.753599 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p2x6t\" (UniqueName: \"kubernetes.io/projected/58a660e6-9e45-4600-a99f-b7153da13ddd-kube-api-access-p2x6t\") pod \"tigera-operator-844669ff44-db7th\" (UID: \"58a660e6-9e45-4600-a99f-b7153da13ddd\") " pod="tigera-operator/tigera-operator-844669ff44-db7th" May 17 00:33:24.753768 kubelet[1967]: I0517 00:33:24.753647 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/58a660e6-9e45-4600-a99f-b7153da13ddd-var-lib-calico\") pod \"tigera-operator-844669ff44-db7th\" (UID: \"58a660e6-9e45-4600-a99f-b7153da13ddd\") " pod="tigera-operator/tigera-operator-844669ff44-db7th" May 17 00:33:24.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit: BPF prog-id=100 op=LOAD May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2034 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834363337313961346330623363333435656166633930636331623030 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2034 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834363337313961346330623363333435656166633930636331623030 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit: BPF prog-id=101 op=LOAD May 17 00:33:24.754000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000252b0 items=0 ppid=2034 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834363337313961346330623363333435656166633930636331623030 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.754000 audit: BPF prog-id=102 op=LOAD May 17 00:33:24.754000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000252f8 items=0 ppid=2034 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834363337313961346330623363333435656166633930636331623030 May 17 00:33:24.755000 audit: BPF prog-id=102 op=UNLOAD May 17 00:33:24.755000 audit: BPF prog-id=101 op=UNLOAD May 17 00:33:24.755000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.755000 audit: BPF prog-id=103 op=LOAD May 17 00:33:24.755000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025708 items=0 ppid=2034 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834363337313961346330623363333435656166633930636331623030 May 17 00:33:24.769382 env[1214]: time="2025-05-17T00:33:24.769332899Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-6g6gj,Uid:aec3a79c-505f-402c-8dfa-bf7cb6639d9b,Namespace:kube-system,Attempt:0,} returns sandbox id \"8463719a4c0b3c345eafc90cc1b00186ef2c1ccf743803c598af4e05c8bb4834\"" May 17 00:33:24.769933 kubelet[1967]: E0517 00:33:24.769906 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:24.776157 env[1214]: time="2025-05-17T00:33:24.776123189Z" level=info msg="CreateContainer within sandbox \"8463719a4c0b3c345eafc90cc1b00186ef2c1ccf743803c598af4e05c8bb4834\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:33:24.792233 env[1214]: time="2025-05-17T00:33:24.792138152Z" level=info msg="CreateContainer within sandbox \"8463719a4c0b3c345eafc90cc1b00186ef2c1ccf743803c598af4e05c8bb4834\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"7c726e465409c20f3edf678ad825060b82e0e021423121d41243b73213c89a69\"" May 17 00:33:24.793338 env[1214]: time="2025-05-17T00:33:24.792938450Z" level=info msg="StartContainer for \"7c726e465409c20f3edf678ad825060b82e0e021423121d41243b73213c89a69\"" May 17 00:33:24.810345 systemd[1]: Started cri-containerd-7c726e465409c20f3edf678ad825060b82e0e021423121d41243b73213c89a69.scope. May 17 00:33:24.825000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb45d2660a8 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373236653436353430396332306633656466363738616438323530 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.825000 audit: BPF prog-id=104 op=LOAD May 17 00:33:24.825000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f90e8 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.825000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373236653436353430396332306633656466363738616438323530 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit: BPF prog-id=105 op=LOAD May 17 00:33:24.826000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f9138 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373236653436353430396332306633656466363738616438323530 May 17 00:33:24.826000 audit: BPF prog-id=105 op=UNLOAD May 17 00:33:24.826000 audit: BPF prog-id=104 op=UNLOAD May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { perfmon } for pid=2075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit[2075]: AVC avc: denied { bpf } for pid=2075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:24.826000 audit: BPF prog-id=106 op=LOAD May 17 00:33:24.826000 audit[2075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f91c8 items=0 ppid=2034 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763373236653436353430396332306633656466363738616438323530 May 17 00:33:24.844914 env[1214]: time="2025-05-17T00:33:24.844850939Z" level=info msg="StartContainer for \"7c726e465409c20f3edf678ad825060b82e0e021423121d41243b73213c89a69\" returns successfully" May 17 00:33:24.954000 audit[2141]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2141 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:24.954000 audit[2141]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe95ee3c30 a2=0 a3=7ffe95ee3c1c items=0 ppid=2086 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.954000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:33:24.954000 audit[2140]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2140 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:24.954000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc61bd070 a2=0 a3=7ffcc61bd05c items=0 ppid=2086 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.954000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:33:24.955000 audit[2143]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:24.955000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcbc63060 a2=0 a3=7fffcbc6304c items=0 ppid=2086 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:33:24.959000 audit[2145]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:24.959000 audit[2145]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd56b22ff0 a2=0 a3=7ffd56b22fdc items=0 ppid=2086 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.959000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:33:24.960000 audit[2146]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:24.960000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4c9f8570 a2=0 a3=7ffd4c9f855c items=0 ppid=2086 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:33:24.961000 audit[2148]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:24.961000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc780e7fa0 a2=0 a3=7ffc780e7f8c items=0 ppid=2086 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:24.961000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:33:25.018756 env[1214]: time="2025-05-17T00:33:25.018702426Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-db7th,Uid:58a660e6-9e45-4600-a99f-b7153da13ddd,Namespace:tigera-operator,Attempt:0,}" May 17 00:33:25.034155 env[1214]: time="2025-05-17T00:33:25.034081137Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:25.034155 env[1214]: time="2025-05-17T00:33:25.034118051Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:25.034155 env[1214]: time="2025-05-17T00:33:25.034127883Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:25.034410 env[1214]: time="2025-05-17T00:33:25.034262702Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/76a86ae25b3acd957ef9221df7f639faebb1341defb8f6150949df4bdb1e23a6 pid=2156 runtime=io.containerd.runc.v2 May 17 00:33:25.045021 systemd[1]: Started cri-containerd-76a86ae25b3acd957ef9221df7f639faebb1341defb8f6150949df4bdb1e23a6.scope. May 17 00:33:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit: BPF prog-id=107 op=LOAD May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736613836616532356233616364393537656639323231646637663633 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736613836616532356233616364393537656639323231646637663633 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit: BPF prog-id=108 op=LOAD May 17 00:33:25.054000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000099cc0 items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736613836616532356233616364393537656639323231646637663633 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit: BPF prog-id=109 op=LOAD May 17 00:33:25.054000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000099d08 items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736613836616532356233616364393537656639323231646637663633 May 17 00:33:25.054000 audit: BPF prog-id=109 op=UNLOAD May 17 00:33:25.054000 audit: BPF prog-id=108 op=UNLOAD May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:25.054000 audit: BPF prog-id=110 op=LOAD May 17 00:33:25.054000 audit[2166]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000410118 items=0 ppid=2156 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.054000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736613836616532356233616364393537656639323231646637663633 May 17 00:33:25.059000 audit[2183]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.059000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0abd87f0 a2=0 a3=7ffd0abd87dc items=0 ppid=2086 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.059000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:33:25.061000 audit[2185]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.061000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffddcdaf710 a2=0 a3=7ffddcdaf6fc items=0 ppid=2086 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.061000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:33:25.064000 audit[2188]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.064000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc411a62c0 a2=0 a3=7ffc411a62ac items=0 ppid=2086 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.064000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:33:25.065000 audit[2189]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.065000 audit[2189]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe19ad9170 a2=0 a3=7ffe19ad915c items=0 ppid=2086 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.065000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:33:25.067000 audit[2191]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.067000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3f0277f0 a2=0 a3=7ffe3f0277dc items=0 ppid=2086 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.067000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:33:25.068000 audit[2192]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.068000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2b14c390 a2=0 a3=7ffd2b14c37c items=0 ppid=2086 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.068000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:33:25.070000 audit[2194]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.070000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff87d21970 a2=0 a3=7fff87d2195c items=0 ppid=2086 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.070000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:33:25.074000 audit[2202]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.074000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe4140e010 a2=0 a3=7ffe4140dffc items=0 ppid=2086 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.074000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:33:25.075000 audit[2204]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.075000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd636f9ec0 a2=0 a3=7ffd636f9eac items=0 ppid=2086 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.075000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:33:25.082213 env[1214]: time="2025-05-17T00:33:25.081442963Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-844669ff44-db7th,Uid:58a660e6-9e45-4600-a99f-b7153da13ddd,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"76a86ae25b3acd957ef9221df7f639faebb1341defb8f6150949df4bdb1e23a6\"" May 17 00:33:25.082927 env[1214]: time="2025-05-17T00:33:25.082896419Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:33:25.081000 audit[2206]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.081000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4aecfd00 a2=0 a3=7ffd4aecfcec items=0 ppid=2086 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.081000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:33:25.082000 audit[2207]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.082000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd676747b0 a2=0 a3=7ffd6767479c items=0 ppid=2086 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.082000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:33:25.084000 audit[2209]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.084000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7c6f0930 a2=0 a3=7ffc7c6f091c items=0 ppid=2086 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.084000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:33:25.088000 audit[2212]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.088000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd0e8d2d00 a2=0 a3=7ffd0e8d2cec items=0 ppid=2086 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.088000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:33:25.091000 audit[2215]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.091000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff26060f00 a2=0 a3=7fff26060eec items=0 ppid=2086 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:33:25.092000 audit[2216]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.092000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe7e685380 a2=0 a3=7ffe7e68536c items=0 ppid=2086 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:33:25.094000 audit[2218]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.094000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fff0fa612c0 a2=0 a3=7fff0fa612ac items=0 ppid=2086 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:25.096000 audit[2221]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.096000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeec995f00 a2=0 a3=7ffeec995eec items=0 ppid=2086 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.096000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:25.097000 audit[2222]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.097000 audit[2222]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6f3a5690 a2=0 a3=7ffd6f3a567c items=0 ppid=2086 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:33:25.100000 audit[2224]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:25.100000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcc9322270 a2=0 a3=7ffcc932225c items=0 ppid=2086 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.100000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:33:25.121000 audit[2230]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:25.121000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe6cd7f3e0 a2=0 a3=7ffe6cd7f3cc items=0 ppid=2086 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:25.129000 audit[2230]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:25.129000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffe6cd7f3e0 a2=0 a3=7ffe6cd7f3cc items=0 ppid=2086 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.129000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:25.130000 audit[2235]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.130000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcba7f5ec0 a2=0 a3=7ffcba7f5eac items=0 ppid=2086 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.130000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:33:25.132000 audit[2237]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.132000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd085398f0 a2=0 a3=7ffd085398dc items=0 ppid=2086 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.132000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:33:25.136000 audit[2240]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.136000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcae61eed0 a2=0 a3=7ffcae61eebc items=0 ppid=2086 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:33:25.137000 audit[2241]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.137000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd435441d0 a2=0 a3=7ffd435441bc items=0 ppid=2086 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.137000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:33:25.139000 audit[2243]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.139000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffde81b5660 a2=0 a3=7ffde81b564c items=0 ppid=2086 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.139000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:33:25.140000 audit[2244]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.140000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc534f15f0 a2=0 a3=7ffc534f15dc items=0 ppid=2086 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.140000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:33:25.142000 audit[2246]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.142000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc7ca90ef0 a2=0 a3=7ffc7ca90edc items=0 ppid=2086 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.142000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:33:25.145000 audit[2249]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.145000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd80069810 a2=0 a3=7ffd800697fc items=0 ppid=2086 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.145000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:33:25.146000 audit[2250]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.146000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff75eb92d0 a2=0 a3=7fff75eb92bc items=0 ppid=2086 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.146000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:33:25.148000 audit[2252]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.148000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe0b6def0 a2=0 a3=7fffe0b6dedc items=0 ppid=2086 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:33:25.149000 audit[2253]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.149000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcd13d030 a2=0 a3=7fffcd13d01c items=0 ppid=2086 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:33:25.151000 audit[2255]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.151000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4264d4e0 a2=0 a3=7ffc4264d4cc items=0 ppid=2086 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.151000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:33:25.154000 audit[2258]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.154000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcf9a3b560 a2=0 a3=7ffcf9a3b54c items=0 ppid=2086 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:33:25.157000 audit[2261]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.157000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc47edd660 a2=0 a3=7ffc47edd64c items=0 ppid=2086 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.157000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:33:25.158000 audit[2262]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.158000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff1bac5b0 a2=0 a3=7ffff1bac59c items=0 ppid=2086 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:33:25.159000 audit[2264]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.159000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffec7c33c80 a2=0 a3=7ffec7c33c6c items=0 ppid=2086 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:25.162000 audit[2267]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.162000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc00facef0 a2=0 a3=7ffc00facedc items=0 ppid=2086 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:25.163000 audit[2268]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.163000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda4525d20 a2=0 a3=7ffda4525d0c items=0 ppid=2086 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:33:25.165000 audit[2270]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.165000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd77fae0c0 a2=0 a3=7ffd77fae0ac items=0 ppid=2086 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:33:25.165000 audit[2271]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.165000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd20ebbd60 a2=0 a3=7ffd20ebbd4c items=0 ppid=2086 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:33:25.167000 audit[2273]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.167000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea6ba4b00 a2=0 a3=7ffea6ba4aec items=0 ppid=2086 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.167000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:25.170000 audit[2276]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:25.170000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc24b87050 a2=0 a3=7ffc24b8703c items=0 ppid=2086 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:25.173000 audit[2278]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:33:25.173000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc9484e5c0 a2=0 a3=7ffc9484e5ac items=0 ppid=2086 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.173000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:25.173000 audit[2278]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:33:25.173000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc9484e5c0 a2=0 a3=7ffc9484e5ac items=0 ppid=2086 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:25.173000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:25.537255 kubelet[1967]: E0517 00:33:25.537197 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:25.537410 kubelet[1967]: E0517 00:33:25.537322 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:25.552055 kubelet[1967]: I0517 00:33:25.551992 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-6g6gj" podStartSLOduration=1.5519738140000001 podStartE2EDuration="1.551973814s" podCreationTimestamp="2025-05-17 00:33:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:25.551877623 +0000 UTC m=+8.145941821" watchObservedRunningTime="2025-05-17 00:33:25.551973814 +0000 UTC m=+8.146038002" May 17 00:33:26.083315 update_engine[1204]: I0517 00:33:26.083256 1204 update_attempter.cc:509] Updating boot flags... May 17 00:33:26.528571 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2844399772.mount: Deactivated successfully. May 17 00:33:27.388840 env[1214]: time="2025-05-17T00:33:27.388779461Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:27.390519 env[1214]: time="2025-05-17T00:33:27.390488193Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:27.392244 env[1214]: time="2025-05-17T00:33:27.392199851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:27.393795 env[1214]: time="2025-05-17T00:33:27.393762665Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:27.394374 env[1214]: time="2025-05-17T00:33:27.394347350Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:33:27.399864 env[1214]: time="2025-05-17T00:33:27.399805882Z" level=info msg="CreateContainer within sandbox \"76a86ae25b3acd957ef9221df7f639faebb1341defb8f6150949df4bdb1e23a6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:33:27.412863 env[1214]: time="2025-05-17T00:33:27.412798335Z" level=info msg="CreateContainer within sandbox \"76a86ae25b3acd957ef9221df7f639faebb1341defb8f6150949df4bdb1e23a6\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"898aa0037c61ee4ecbcf96521e9237d627ebc41dbdc7622a4f788adf6dcfc0fc\"" May 17 00:33:27.413524 env[1214]: time="2025-05-17T00:33:27.413447244Z" level=info msg="StartContainer for \"898aa0037c61ee4ecbcf96521e9237d627ebc41dbdc7622a4f788adf6dcfc0fc\"" May 17 00:33:27.432148 systemd[1]: run-containerd-runc-k8s.io-898aa0037c61ee4ecbcf96521e9237d627ebc41dbdc7622a4f788adf6dcfc0fc-runc.dgvWX2.mount: Deactivated successfully. May 17 00:33:27.433858 systemd[1]: Started cri-containerd-898aa0037c61ee4ecbcf96521e9237d627ebc41dbdc7622a4f788adf6dcfc0fc.scope. May 17 00:33:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit: BPF prog-id=111 op=LOAD May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2156 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:27.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386161303033376336316565346563626366393635323165393233 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2156 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:27.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386161303033376336316565346563626366393635323165393233 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit: BPF prog-id=112 op=LOAD May 17 00:33:27.441000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000310e10 items=0 ppid=2156 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:27.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386161303033376336316565346563626366393635323165393233 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit: BPF prog-id=113 op=LOAD May 17 00:33:27.441000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000310e58 items=0 ppid=2156 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:27.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386161303033376336316565346563626366393635323165393233 May 17 00:33:27.441000 audit: BPF prog-id=113 op=UNLOAD May 17 00:33:27.441000 audit: BPF prog-id=112 op=UNLOAD May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:27.441000 audit: BPF prog-id=114 op=LOAD May 17 00:33:27.441000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000311268 items=0 ppid=2156 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:27.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839386161303033376336316565346563626366393635323165393233 May 17 00:33:27.454743 env[1214]: time="2025-05-17T00:33:27.454686998Z" level=info msg="StartContainer for \"898aa0037c61ee4ecbcf96521e9237d627ebc41dbdc7622a4f788adf6dcfc0fc\" returns successfully" May 17 00:33:27.611504 kubelet[1967]: I0517 00:33:27.611363 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-844669ff44-db7th" podStartSLOduration=1.298721937 podStartE2EDuration="3.611342045s" podCreationTimestamp="2025-05-17 00:33:24 +0000 UTC" firstStartedPulling="2025-05-17 00:33:25.082421412 +0000 UTC m=+7.676485600" lastFinishedPulling="2025-05-17 00:33:27.39504152 +0000 UTC m=+9.989105708" observedRunningTime="2025-05-17 00:33:27.611216182 +0000 UTC m=+10.205280370" watchObservedRunningTime="2025-05-17 00:33:27.611342045 +0000 UTC m=+10.205406233" May 17 00:33:28.207064 kubelet[1967]: E0517 00:33:28.207024 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:28.305099 kubelet[1967]: E0517 00:33:28.305062 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:28.542431 kubelet[1967]: E0517 00:33:28.542394 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:33.218463 sudo[1349]: pam_unix(sudo:session): session closed for user root May 17 00:33:33.217000 audit[1349]: USER_END pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:33:33.224541 kernel: kauditd_printk_skb: 369 callbacks suppressed May 17 00:33:33.224636 kernel: audit: type=1106 audit(1747442013.217:918): pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:33:33.221327 sshd[1346]: pam_unix(sshd:session): session closed for user core May 17 00:33:33.217000 audit[1349]: CRED_DISP pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:33:33.227253 systemd[1]: sshd@6-10.0.0.66:22-10.0.0.1:58332.service: Deactivated successfully. May 17 00:33:33.228276 kernel: audit: type=1104 audit(1747442013.217:919): pid=1349 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:33:33.224000 audit[1346]: USER_END pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:33.228426 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:33:33.228551 systemd[1]: session-7.scope: Consumed 5.000s CPU time. May 17 00:33:33.229108 systemd-logind[1203]: Session 7 logged out. Waiting for processes to exit. May 17 00:33:33.229862 systemd-logind[1203]: Removed session 7. May 17 00:33:33.232742 kernel: audit: type=1106 audit(1747442013.224:920): pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:33.224000 audit[1346]: CRED_DISP pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:33.236503 kernel: audit: type=1104 audit(1747442013.224:921): pid=1346 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:33.236567 kernel: audit: type=1131 audit(1747442013.226:922): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.66:22-10.0.0.1:58332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:33.226000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.66:22-10.0.0.1:58332 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:33.472000 audit[2386]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:33.472000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffccd734e50 a2=0 a3=7ffccd734e3c items=0 ppid=2086 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.497270 kernel: audit: type=1325 audit(1747442013.472:923): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:33.497443 kernel: audit: type=1300 audit(1747442013.472:923): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffccd734e50 a2=0 a3=7ffccd734e3c items=0 ppid=2086 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:33.477000 audit[2386]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:33.505524 kernel: audit: type=1327 audit(1747442013.472:923): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:33.505575 kernel: audit: type=1325 audit(1747442013.477:924): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:33.477000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffccd734e50 a2=0 a3=0 items=0 ppid=2086 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.511562 kernel: audit: type=1300 audit(1747442013.477:924): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffccd734e50 a2=0 a3=0 items=0 ppid=2086 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.477000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:33.506000 audit[2388]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:33.506000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe76d8e690 a2=0 a3=7ffe76d8e67c items=0 ppid=2086 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:33.513000 audit[2388]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:33.513000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe76d8e690 a2=0 a3=0 items=0 ppid=2086 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.513000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:35.734000 audit[2390]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:35.734000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffce7e464a0 a2=0 a3=7ffce7e4648c items=0 ppid=2086 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:35.734000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:35.740000 audit[2390]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:35.740000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffce7e464a0 a2=0 a3=0 items=0 ppid=2086 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:35.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:35.750000 audit[2392]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:35.750000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7fff34da02a0 a2=0 a3=7fff34da028c items=0 ppid=2086 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:35.750000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:35.754000 audit[2392]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:35.754000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff34da02a0 a2=0 a3=0 items=0 ppid=2086 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:35.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:36.128525 systemd[1]: Created slice kubepods-besteffort-pod15dc76c0_bd25_4209_86ec_916d407bfc6a.slice. May 17 00:33:36.130898 kubelet[1967]: I0517 00:33:36.130864 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/15dc76c0-bd25-4209-86ec-916d407bfc6a-tigera-ca-bundle\") pod \"calico-typha-9546fdfdd-mjrz5\" (UID: \"15dc76c0-bd25-4209-86ec-916d407bfc6a\") " pod="calico-system/calico-typha-9546fdfdd-mjrz5" May 17 00:33:36.131456 kubelet[1967]: I0517 00:33:36.131429 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/15dc76c0-bd25-4209-86ec-916d407bfc6a-typha-certs\") pod \"calico-typha-9546fdfdd-mjrz5\" (UID: \"15dc76c0-bd25-4209-86ec-916d407bfc6a\") " pod="calico-system/calico-typha-9546fdfdd-mjrz5" May 17 00:33:36.131570 kubelet[1967]: I0517 00:33:36.131463 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mqmvd\" (UniqueName: \"kubernetes.io/projected/15dc76c0-bd25-4209-86ec-916d407bfc6a-kube-api-access-mqmvd\") pod \"calico-typha-9546fdfdd-mjrz5\" (UID: \"15dc76c0-bd25-4209-86ec-916d407bfc6a\") " pod="calico-system/calico-typha-9546fdfdd-mjrz5" May 17 00:33:36.432685 kubelet[1967]: E0517 00:33:36.432560 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:36.433222 env[1214]: time="2025-05-17T00:33:36.433118043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9546fdfdd-mjrz5,Uid:15dc76c0-bd25-4209-86ec-916d407bfc6a,Namespace:calico-system,Attempt:0,}" May 17 00:33:36.454932 env[1214]: time="2025-05-17T00:33:36.454815476Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:36.454932 env[1214]: time="2025-05-17T00:33:36.454853496Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:36.454932 env[1214]: time="2025-05-17T00:33:36.454868128Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:36.455459 env[1214]: time="2025-05-17T00:33:36.455368259Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abfde2fab46c0dc0c7a83d57801d7faae54164354ff729b435403cf533cf7867 pid=2402 runtime=io.containerd.runc.v2 May 17 00:33:36.473655 systemd[1]: Started cri-containerd-abfde2fab46c0dc0c7a83d57801d7faae54164354ff729b435403cf533cf7867.scope. May 17 00:33:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.484000 audit: BPF prog-id=115 op=LOAD May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2402 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666465326661623436633064633063376138336435373830316437 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2402 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666465326661623436633064633063376138336435373830316437 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit: BPF prog-id=116 op=LOAD May 17 00:33:36.485000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b64c0 items=0 ppid=2402 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666465326661623436633064633063376138336435373830316437 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit: BPF prog-id=117 op=LOAD May 17 00:33:36.485000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003b6508 items=0 ppid=2402 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666465326661623436633064633063376138336435373830316437 May 17 00:33:36.485000 audit: BPF prog-id=117 op=UNLOAD May 17 00:33:36.485000 audit: BPF prog-id=116 op=UNLOAD May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { perfmon } for pid=2412 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit[2412]: AVC avc: denied { bpf } for pid=2412 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.485000 audit: BPF prog-id=118 op=LOAD May 17 00:33:36.485000 audit[2412]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003b6918 items=0 ppid=2402 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666465326661623436633064633063376138336435373830316437 May 17 00:33:36.525750 env[1214]: time="2025-05-17T00:33:36.525636165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-9546fdfdd-mjrz5,Uid:15dc76c0-bd25-4209-86ec-916d407bfc6a,Namespace:calico-system,Attempt:0,} returns sandbox id \"abfde2fab46c0dc0c7a83d57801d7faae54164354ff729b435403cf533cf7867\"" May 17 00:33:36.526404 kubelet[1967]: E0517 00:33:36.526370 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:36.528943 env[1214]: time="2025-05-17T00:33:36.528900426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:33:36.530543 systemd[1]: Created slice kubepods-besteffort-pod21af2500_a5b5_424b_9934_5581ca27eb10.slice. May 17 00:33:36.532896 kubelet[1967]: I0517 00:33:36.532859 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-lib-modules\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.532896 kubelet[1967]: I0517 00:33:36.532886 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-policysync\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.532896 kubelet[1967]: I0517 00:33:36.532900 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-var-run-calico\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533039 kubelet[1967]: I0517 00:33:36.532914 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-var-lib-calico\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533039 kubelet[1967]: I0517 00:33:36.532926 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-xtables-lock\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533039 kubelet[1967]: I0517 00:33:36.532939 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-cni-bin-dir\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533039 kubelet[1967]: I0517 00:33:36.532953 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-flexvol-driver-host\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533039 kubelet[1967]: I0517 00:33:36.532965 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-cni-log-dir\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533244 kubelet[1967]: I0517 00:33:36.532977 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/21af2500-a5b5-424b-9934-5581ca27eb10-node-certs\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533244 kubelet[1967]: I0517 00:33:36.532990 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/21af2500-a5b5-424b-9934-5581ca27eb10-cni-net-dir\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533244 kubelet[1967]: I0517 00:33:36.533002 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/21af2500-a5b5-424b-9934-5581ca27eb10-tigera-ca-bundle\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.533244 kubelet[1967]: I0517 00:33:36.533017 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fg6bc\" (UniqueName: \"kubernetes.io/projected/21af2500-a5b5-424b-9934-5581ca27eb10-kube-api-access-fg6bc\") pod \"calico-node-c7knh\" (UID: \"21af2500-a5b5-424b-9934-5581ca27eb10\") " pod="calico-system/calico-node-c7knh" May 17 00:33:36.637088 kubelet[1967]: E0517 00:33:36.635552 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.637088 kubelet[1967]: W0517 00:33:36.635572 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.637088 kubelet[1967]: E0517 00:33:36.635600 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.637626 kubelet[1967]: E0517 00:33:36.637599 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.637626 kubelet[1967]: W0517 00:33:36.637617 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.637626 kubelet[1967]: E0517 00:33:36.637633 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.644167 kubelet[1967]: E0517 00:33:36.644139 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.644167 kubelet[1967]: W0517 00:33:36.644159 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.644167 kubelet[1967]: E0517 00:33:36.644189 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.767000 audit[2444]: NETFILTER_CFG table=filter:97 family=2 entries=20 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:36.767000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7fff1ab4c1c0 a2=0 a3=7fff1ab4c1ac items=0 ppid=2086 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.767000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:36.775000 audit[2444]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2444 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:36.775000 audit[2444]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff1ab4c1c0 a2=0 a3=0 items=0 ppid=2086 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:36.833412 env[1214]: time="2025-05-17T00:33:36.833348067Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c7knh,Uid:21af2500-a5b5-424b-9934-5581ca27eb10,Namespace:calico-system,Attempt:0,}" May 17 00:33:36.868029 env[1214]: time="2025-05-17T00:33:36.867965930Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:36.868249 env[1214]: time="2025-05-17T00:33:36.868034526Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:36.868249 env[1214]: time="2025-05-17T00:33:36.868060410Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:36.868416 env[1214]: time="2025-05-17T00:33:36.868388537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612 pid=2452 runtime=io.containerd.runc.v2 May 17 00:33:36.875846 kubelet[1967]: E0517 00:33:36.875507 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:36.882783 systemd[1]: Started cri-containerd-8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612.scope. May 17 00:33:36.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit: BPF prog-id=119 op=LOAD May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2452 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865663465663965623261396231323765663839346236353566366532 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2452 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865663465663965623261396231323765663839346236353566366532 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit: BPF prog-id=120 op=LOAD May 17 00:33:36.893000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022fe60 items=0 ppid=2452 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865663465663965623261396231323765663839346236353566366532 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit: BPF prog-id=121 op=LOAD May 17 00:33:36.893000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022fea8 items=0 ppid=2452 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865663465663965623261396231323765663839346236353566366532 May 17 00:33:36.893000 audit: BPF prog-id=121 op=UNLOAD May 17 00:33:36.893000 audit: BPF prog-id=120 op=UNLOAD May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:36.893000 audit: BPF prog-id=122 op=LOAD May 17 00:33:36.893000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002702b8 items=0 ppid=2452 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:36.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3865663465663965623261396231323765663839346236353566366532 May 17 00:33:36.905812 env[1214]: time="2025-05-17T00:33:36.905767982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-c7knh,Uid:21af2500-a5b5-424b-9934-5581ca27eb10,Namespace:calico-system,Attempt:0,} returns sandbox id \"8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612\"" May 17 00:33:36.933950 kubelet[1967]: E0517 00:33:36.933915 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.933950 kubelet[1967]: W0517 00:33:36.933940 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.934229 kubelet[1967]: E0517 00:33:36.933965 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.934353 kubelet[1967]: E0517 00:33:36.934336 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.934353 kubelet[1967]: W0517 00:33:36.934350 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.934419 kubelet[1967]: E0517 00:33:36.934359 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.934503 kubelet[1967]: E0517 00:33:36.934490 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.934503 kubelet[1967]: W0517 00:33:36.934499 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.934569 kubelet[1967]: E0517 00:33:36.934505 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.934682 kubelet[1967]: E0517 00:33:36.934668 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.934682 kubelet[1967]: W0517 00:33:36.934679 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.934748 kubelet[1967]: E0517 00:33:36.934687 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.934832 kubelet[1967]: E0517 00:33:36.934818 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.934832 kubelet[1967]: W0517 00:33:36.934828 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.934898 kubelet[1967]: E0517 00:33:36.934835 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.934984 kubelet[1967]: E0517 00:33:36.934969 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.934984 kubelet[1967]: W0517 00:33:36.934980 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.935045 kubelet[1967]: E0517 00:33:36.934987 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.935138 kubelet[1967]: E0517 00:33:36.935123 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.935138 kubelet[1967]: W0517 00:33:36.935134 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.935238 kubelet[1967]: E0517 00:33:36.935144 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.935300 kubelet[1967]: E0517 00:33:36.935286 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.935300 kubelet[1967]: W0517 00:33:36.935296 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.935360 kubelet[1967]: E0517 00:33:36.935302 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.935425 kubelet[1967]: E0517 00:33:36.935413 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.935425 kubelet[1967]: W0517 00:33:36.935423 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.935492 kubelet[1967]: E0517 00:33:36.935430 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.935546 kubelet[1967]: E0517 00:33:36.935534 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.935546 kubelet[1967]: W0517 00:33:36.935543 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.935609 kubelet[1967]: E0517 00:33:36.935548 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.935663 kubelet[1967]: E0517 00:33:36.935650 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.935663 kubelet[1967]: W0517 00:33:36.935659 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.935663 kubelet[1967]: E0517 00:33:36.935664 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.935841 kubelet[1967]: E0517 00:33:36.935823 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.935841 kubelet[1967]: W0517 00:33:36.935836 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.935939 kubelet[1967]: E0517 00:33:36.935846 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.940041 kubelet[1967]: E0517 00:33:36.939976 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.940285 kubelet[1967]: W0517 00:33:36.940009 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.940285 kubelet[1967]: E0517 00:33:36.940252 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.940768 kubelet[1967]: E0517 00:33:36.940741 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.940768 kubelet[1967]: W0517 00:33:36.940754 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.940768 kubelet[1967]: E0517 00:33:36.940763 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.941123 kubelet[1967]: E0517 00:33:36.940960 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.941123 kubelet[1967]: W0517 00:33:36.940968 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.941123 kubelet[1967]: E0517 00:33:36.940975 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.941123 kubelet[1967]: E0517 00:33:36.941116 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.941123 kubelet[1967]: W0517 00:33:36.941123 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.941123 kubelet[1967]: E0517 00:33:36.941139 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.942502 kubelet[1967]: E0517 00:33:36.942476 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.942599 kubelet[1967]: W0517 00:33:36.942568 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.942655 kubelet[1967]: E0517 00:33:36.942606 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.942818 kubelet[1967]: E0517 00:33:36.942798 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.942818 kubelet[1967]: W0517 00:33:36.942816 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.942882 kubelet[1967]: E0517 00:33:36.942824 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.942982 kubelet[1967]: E0517 00:33:36.942967 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.943011 kubelet[1967]: W0517 00:33:36.942983 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.943011 kubelet[1967]: E0517 00:33:36.942991 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.943274 kubelet[1967]: E0517 00:33:36.943192 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.943549 kubelet[1967]: W0517 00:33:36.943535 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.943604 kubelet[1967]: E0517 00:33:36.943549 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.943974 kubelet[1967]: E0517 00:33:36.943933 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.944077 kubelet[1967]: W0517 00:33:36.944033 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.944211 kubelet[1967]: E0517 00:33:36.944159 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.944345 kubelet[1967]: I0517 00:33:36.944328 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/34edfeda-9b15-4dd5-8e02-698e32cac2dc-socket-dir\") pod \"csi-node-driver-t6g96\" (UID: \"34edfeda-9b15-4dd5-8e02-698e32cac2dc\") " pod="calico-system/csi-node-driver-t6g96" May 17 00:33:36.945892 kubelet[1967]: E0517 00:33:36.945865 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.945985 kubelet[1967]: W0517 00:33:36.945890 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.945985 kubelet[1967]: E0517 00:33:36.945916 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.946136 kubelet[1967]: E0517 00:33:36.946118 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.946136 kubelet[1967]: W0517 00:33:36.946125 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.946136 kubelet[1967]: E0517 00:33:36.946132 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.946426 kubelet[1967]: E0517 00:33:36.946297 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.946426 kubelet[1967]: W0517 00:33:36.946305 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.946426 kubelet[1967]: E0517 00:33:36.946314 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.946426 kubelet[1967]: I0517 00:33:36.946340 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/34edfeda-9b15-4dd5-8e02-698e32cac2dc-varrun\") pod \"csi-node-driver-t6g96\" (UID: \"34edfeda-9b15-4dd5-8e02-698e32cac2dc\") " pod="calico-system/csi-node-driver-t6g96" May 17 00:33:36.946843 kubelet[1967]: E0517 00:33:36.946485 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.946843 kubelet[1967]: W0517 00:33:36.946493 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.946843 kubelet[1967]: E0517 00:33:36.946500 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.946843 kubelet[1967]: I0517 00:33:36.946512 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xw5gh\" (UniqueName: \"kubernetes.io/projected/34edfeda-9b15-4dd5-8e02-698e32cac2dc-kube-api-access-xw5gh\") pod \"csi-node-driver-t6g96\" (UID: \"34edfeda-9b15-4dd5-8e02-698e32cac2dc\") " pod="calico-system/csi-node-driver-t6g96" May 17 00:33:36.949233 kubelet[1967]: E0517 00:33:36.949154 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.949233 kubelet[1967]: W0517 00:33:36.949214 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.949233 kubelet[1967]: E0517 00:33:36.949230 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.949365 kubelet[1967]: I0517 00:33:36.949259 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/34edfeda-9b15-4dd5-8e02-698e32cac2dc-registration-dir\") pod \"csi-node-driver-t6g96\" (UID: \"34edfeda-9b15-4dd5-8e02-698e32cac2dc\") " pod="calico-system/csi-node-driver-t6g96" May 17 00:33:36.949573 kubelet[1967]: E0517 00:33:36.949554 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.949573 kubelet[1967]: W0517 00:33:36.949568 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.949693 kubelet[1967]: E0517 00:33:36.949576 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.949693 kubelet[1967]: I0517 00:33:36.949673 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/34edfeda-9b15-4dd5-8e02-698e32cac2dc-kubelet-dir\") pod \"csi-node-driver-t6g96\" (UID: \"34edfeda-9b15-4dd5-8e02-698e32cac2dc\") " pod="calico-system/csi-node-driver-t6g96" May 17 00:33:36.950084 kubelet[1967]: E0517 00:33:36.949910 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950084 kubelet[1967]: W0517 00:33:36.949920 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.950084 kubelet[1967]: E0517 00:33:36.949928 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.950084 kubelet[1967]: E0517 00:33:36.950088 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950301 kubelet[1967]: W0517 00:33:36.950095 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.950301 kubelet[1967]: E0517 00:33:36.950102 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.950301 kubelet[1967]: E0517 00:33:36.950274 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950301 kubelet[1967]: W0517 00:33:36.950282 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.950301 kubelet[1967]: E0517 00:33:36.950288 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.950413 kubelet[1967]: E0517 00:33:36.950403 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950413 kubelet[1967]: W0517 00:33:36.950411 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.950458 kubelet[1967]: E0517 00:33:36.950418 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.950543 kubelet[1967]: E0517 00:33:36.950528 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950543 kubelet[1967]: W0517 00:33:36.950538 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.950543 kubelet[1967]: E0517 00:33:36.950544 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.950666 kubelet[1967]: E0517 00:33:36.950653 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950666 kubelet[1967]: W0517 00:33:36.950663 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.950731 kubelet[1967]: E0517 00:33:36.950670 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.950818 kubelet[1967]: E0517 00:33:36.950803 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950818 kubelet[1967]: W0517 00:33:36.950814 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.950874 kubelet[1967]: E0517 00:33:36.950821 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:36.950985 kubelet[1967]: E0517 00:33:36.950973 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:36.950985 kubelet[1967]: W0517 00:33:36.950983 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:36.951037 kubelet[1967]: E0517 00:33:36.950990 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.050637 kubelet[1967]: E0517 00:33:37.050615 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.050637 kubelet[1967]: W0517 00:33:37.050632 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.050838 kubelet[1967]: E0517 00:33:37.050654 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.050903 kubelet[1967]: E0517 00:33:37.050889 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.050903 kubelet[1967]: W0517 00:33:37.050901 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.050978 kubelet[1967]: E0517 00:33:37.050911 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.051121 kubelet[1967]: E0517 00:33:37.051102 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.051121 kubelet[1967]: W0517 00:33:37.051114 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.051198 kubelet[1967]: E0517 00:33:37.051124 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.051472 kubelet[1967]: E0517 00:33:37.051435 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.051472 kubelet[1967]: W0517 00:33:37.051463 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.051544 kubelet[1967]: E0517 00:33:37.051484 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.051685 kubelet[1967]: E0517 00:33:37.051665 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.051685 kubelet[1967]: W0517 00:33:37.051676 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.051685 kubelet[1967]: E0517 00:33:37.051683 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.051861 kubelet[1967]: E0517 00:33:37.051841 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.051861 kubelet[1967]: W0517 00:33:37.051851 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.051861 kubelet[1967]: E0517 00:33:37.051857 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.052065 kubelet[1967]: E0517 00:33:37.052046 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.052065 kubelet[1967]: W0517 00:33:37.052056 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.052065 kubelet[1967]: E0517 00:33:37.052063 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.052293 kubelet[1967]: E0517 00:33:37.052275 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.052293 kubelet[1967]: W0517 00:33:37.052285 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.052293 kubelet[1967]: E0517 00:33:37.052292 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.052467 kubelet[1967]: E0517 00:33:37.052452 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.052467 kubelet[1967]: W0517 00:33:37.052462 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.052547 kubelet[1967]: E0517 00:33:37.052469 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.052661 kubelet[1967]: E0517 00:33:37.052649 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.052661 kubelet[1967]: W0517 00:33:37.052659 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.052717 kubelet[1967]: E0517 00:33:37.052665 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.052857 kubelet[1967]: E0517 00:33:37.052846 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.052891 kubelet[1967]: W0517 00:33:37.052858 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.052891 kubelet[1967]: E0517 00:33:37.052866 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.053044 kubelet[1967]: E0517 00:33:37.053032 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.053044 kubelet[1967]: W0517 00:33:37.053042 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.053095 kubelet[1967]: E0517 00:33:37.053049 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.053265 kubelet[1967]: E0517 00:33:37.053252 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.053265 kubelet[1967]: W0517 00:33:37.053262 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.053333 kubelet[1967]: E0517 00:33:37.053269 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.053709 kubelet[1967]: E0517 00:33:37.053689 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.053772 kubelet[1967]: W0517 00:33:37.053708 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.053772 kubelet[1967]: E0517 00:33:37.053724 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.053995 kubelet[1967]: E0517 00:33:37.053972 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.053995 kubelet[1967]: W0517 00:33:37.053986 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.053995 kubelet[1967]: E0517 00:33:37.053996 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.054300 kubelet[1967]: E0517 00:33:37.054256 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.054300 kubelet[1967]: W0517 00:33:37.054270 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.054300 kubelet[1967]: E0517 00:33:37.054282 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.054543 kubelet[1967]: E0517 00:33:37.054527 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.054543 kubelet[1967]: W0517 00:33:37.054539 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.054632 kubelet[1967]: E0517 00:33:37.054555 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.054785 kubelet[1967]: E0517 00:33:37.054763 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.054785 kubelet[1967]: W0517 00:33:37.054776 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.054875 kubelet[1967]: E0517 00:33:37.054786 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.055090 kubelet[1967]: E0517 00:33:37.055047 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.055090 kubelet[1967]: W0517 00:33:37.055061 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.055090 kubelet[1967]: E0517 00:33:37.055070 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.055323 kubelet[1967]: E0517 00:33:37.055285 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.055323 kubelet[1967]: W0517 00:33:37.055299 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.055323 kubelet[1967]: E0517 00:33:37.055309 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.055729 kubelet[1967]: E0517 00:33:37.055692 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.055729 kubelet[1967]: W0517 00:33:37.055706 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.055729 kubelet[1967]: E0517 00:33:37.055717 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.058064 kubelet[1967]: E0517 00:33:37.058038 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.058064 kubelet[1967]: W0517 00:33:37.058053 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.058064 kubelet[1967]: E0517 00:33:37.058063 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.058319 kubelet[1967]: E0517 00:33:37.058299 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.058319 kubelet[1967]: W0517 00:33:37.058309 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.058319 kubelet[1967]: E0517 00:33:37.058317 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.058522 kubelet[1967]: E0517 00:33:37.058501 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.058522 kubelet[1967]: W0517 00:33:37.058520 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.058614 kubelet[1967]: E0517 00:33:37.058534 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.058802 kubelet[1967]: E0517 00:33:37.058786 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.058802 kubelet[1967]: W0517 00:33:37.058796 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.058884 kubelet[1967]: E0517 00:33:37.058805 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.060895 kubelet[1967]: E0517 00:33:37.060874 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:37.060895 kubelet[1967]: W0517 00:33:37.060885 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:37.060895 kubelet[1967]: E0517 00:33:37.060894 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:37.840929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3890841106.mount: Deactivated successfully. May 17 00:33:38.509934 kubelet[1967]: E0517 00:33:38.509874 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:40.509588 kubelet[1967]: E0517 00:33:40.509525 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:40.568503 env[1214]: time="2025-05-17T00:33:40.568425364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:40.570453 env[1214]: time="2025-05-17T00:33:40.570412521Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:40.572344 env[1214]: time="2025-05-17T00:33:40.572309860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:40.573840 env[1214]: time="2025-05-17T00:33:40.573799198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:40.574327 env[1214]: time="2025-05-17T00:33:40.574292657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:33:40.575316 env[1214]: time="2025-05-17T00:33:40.575292444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:33:40.589671 env[1214]: time="2025-05-17T00:33:40.589621665Z" level=info msg="CreateContainer within sandbox \"abfde2fab46c0dc0c7a83d57801d7faae54164354ff729b435403cf533cf7867\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:33:40.608098 env[1214]: time="2025-05-17T00:33:40.608038014Z" level=info msg="CreateContainer within sandbox \"abfde2fab46c0dc0c7a83d57801d7faae54164354ff729b435403cf533cf7867\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a06bf4fa62fa969d39b88ef1cdedf6e52c409d9fdfa8850b213e4538f58bd6cb\"" May 17 00:33:40.608708 env[1214]: time="2025-05-17T00:33:40.608674181Z" level=info msg="StartContainer for \"a06bf4fa62fa969d39b88ef1cdedf6e52c409d9fdfa8850b213e4538f58bd6cb\"" May 17 00:33:40.624346 systemd[1]: Started cri-containerd-a06bf4fa62fa969d39b88ef1cdedf6e52c409d9fdfa8850b213e4538f58bd6cb.scope. May 17 00:33:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.638609 kernel: kauditd_printk_skb: 139 callbacks suppressed May 17 00:33:40.638673 kernel: audit: type=1400 audit(1747442020.636:969): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.645533 kernel: audit: type=1400 audit(1747442020.636:970): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.645585 kernel: audit: type=1400 audit(1747442020.636:971): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648859 kernel: audit: type=1400 audit(1747442020.636:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.652247 kernel: audit: type=1400 audit(1747442020.636:973): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655735 kernel: audit: type=1400 audit(1747442020.636:974): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.659028 kernel: audit: type=1400 audit(1747442020.636:975): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.662334 kernel: audit: type=1400 audit(1747442020.636:976): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.665647 kernel: audit: type=1400 audit(1747442020.636:977): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.636000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.672413 kernel: audit: type=1400 audit(1747442020.641:978): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit: BPF prog-id=123 op=LOAD May 17 00:33:40.641000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2402 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130366266346661363266613936396433396238386566316364656466 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=2402 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130366266346661363266613936396433396238386566316364656466 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.641000 audit: BPF prog-id=124 op=LOAD May 17 00:33:40.641000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000284580 items=0 ppid=2402 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.641000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130366266346661363266613936396433396238386566316364656466 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.648000 audit: BPF prog-id=125 op=LOAD May 17 00:33:40.648000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0002845c8 items=0 ppid=2402 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130366266346661363266613936396433396238386566316364656466 May 17 00:33:40.655000 audit: BPF prog-id=125 op=UNLOAD May 17 00:33:40.655000 audit: BPF prog-id=124 op=UNLOAD May 17 00:33:40.655000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.655000 audit: BPF prog-id=126 op=LOAD May 17 00:33:40.655000 audit[2558]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0002849d8 items=0 ppid=2402 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130366266346661363266613936396433396238386566316364656466 May 17 00:33:40.695543 env[1214]: time="2025-05-17T00:33:40.695479760Z" level=info msg="StartContainer for \"a06bf4fa62fa969d39b88ef1cdedf6e52c409d9fdfa8850b213e4538f58bd6cb\" returns successfully" May 17 00:33:41.564213 kubelet[1967]: E0517 00:33:41.564144 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:41.574096 kubelet[1967]: E0517 00:33:41.574045 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.574096 kubelet[1967]: W0517 00:33:41.574077 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.574096 kubelet[1967]: E0517 00:33:41.574098 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.574382 kubelet[1967]: E0517 00:33:41.574344 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.574382 kubelet[1967]: W0517 00:33:41.574359 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.574484 kubelet[1967]: E0517 00:33:41.574420 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.574603 kubelet[1967]: E0517 00:33:41.574579 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.574603 kubelet[1967]: W0517 00:33:41.574595 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.574603 kubelet[1967]: E0517 00:33:41.574603 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.574849 kubelet[1967]: E0517 00:33:41.574827 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.574849 kubelet[1967]: W0517 00:33:41.574842 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.574932 kubelet[1967]: E0517 00:33:41.574852 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.575050 kubelet[1967]: E0517 00:33:41.575024 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.575050 kubelet[1967]: W0517 00:33:41.575039 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.575050 kubelet[1967]: E0517 00:33:41.575049 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.575305 kubelet[1967]: E0517 00:33:41.575281 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.575305 kubelet[1967]: W0517 00:33:41.575293 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.575305 kubelet[1967]: E0517 00:33:41.575302 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.575539 kubelet[1967]: E0517 00:33:41.575454 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.575539 kubelet[1967]: W0517 00:33:41.575470 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.575539 kubelet[1967]: E0517 00:33:41.575477 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.575610 kubelet[1967]: E0517 00:33:41.575581 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.575610 kubelet[1967]: W0517 00:33:41.575597 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.575610 kubelet[1967]: E0517 00:33:41.575604 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.575757 kubelet[1967]: E0517 00:33:41.575742 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.575757 kubelet[1967]: W0517 00:33:41.575752 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.575757 kubelet[1967]: E0517 00:33:41.575760 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.575881 kubelet[1967]: E0517 00:33:41.575867 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.575881 kubelet[1967]: W0517 00:33:41.575874 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.575881 kubelet[1967]: E0517 00:33:41.575881 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.576001 kubelet[1967]: E0517 00:33:41.575974 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.576001 kubelet[1967]: W0517 00:33:41.575991 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.576001 kubelet[1967]: E0517 00:33:41.576000 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.576124 kubelet[1967]: E0517 00:33:41.576114 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.576124 kubelet[1967]: W0517 00:33:41.576121 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.576185 kubelet[1967]: E0517 00:33:41.576127 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.576343 kubelet[1967]: E0517 00:33:41.576323 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.576432 kubelet[1967]: W0517 00:33:41.576412 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.576538 kubelet[1967]: E0517 00:33:41.576522 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.576830 kubelet[1967]: E0517 00:33:41.576820 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.576942 kubelet[1967]: W0517 00:33:41.576910 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.576942 kubelet[1967]: E0517 00:33:41.576930 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.577122 kubelet[1967]: E0517 00:33:41.577101 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.577122 kubelet[1967]: W0517 00:33:41.577114 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.577248 kubelet[1967]: E0517 00:33:41.577133 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.582773 kubelet[1967]: E0517 00:33:41.582654 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.582773 kubelet[1967]: W0517 00:33:41.582675 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.582773 kubelet[1967]: E0517 00:33:41.582695 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.583011 kubelet[1967]: E0517 00:33:41.582892 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.583011 kubelet[1967]: W0517 00:33:41.582908 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.583011 kubelet[1967]: E0517 00:33:41.582918 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.583142 kubelet[1967]: E0517 00:33:41.583129 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.583142 kubelet[1967]: W0517 00:33:41.583139 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.583223 kubelet[1967]: E0517 00:33:41.583150 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.583400 kubelet[1967]: E0517 00:33:41.583381 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.583400 kubelet[1967]: W0517 00:33:41.583394 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.583480 kubelet[1967]: E0517 00:33:41.583405 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.583675 kubelet[1967]: E0517 00:33:41.583644 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.583819 kubelet[1967]: W0517 00:33:41.583667 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.583819 kubelet[1967]: E0517 00:33:41.583708 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.584074 kubelet[1967]: E0517 00:33:41.584047 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.584074 kubelet[1967]: W0517 00:33:41.584068 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.584224 kubelet[1967]: E0517 00:33:41.584078 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.584583 kubelet[1967]: E0517 00:33:41.584533 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.584583 kubelet[1967]: W0517 00:33:41.584553 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.584583 kubelet[1967]: E0517 00:33:41.584575 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.584810 kubelet[1967]: E0517 00:33:41.584793 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.584810 kubelet[1967]: W0517 00:33:41.584805 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.584928 kubelet[1967]: E0517 00:33:41.584815 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.585115 kubelet[1967]: E0517 00:33:41.585098 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.585115 kubelet[1967]: W0517 00:33:41.585113 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.585248 kubelet[1967]: E0517 00:33:41.585128 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.585369 kubelet[1967]: E0517 00:33:41.585355 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.585369 kubelet[1967]: W0517 00:33:41.585367 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.585429 kubelet[1967]: E0517 00:33:41.585377 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.585653 kubelet[1967]: E0517 00:33:41.585623 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.585653 kubelet[1967]: W0517 00:33:41.585648 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.585735 kubelet[1967]: E0517 00:33:41.585658 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.585906 kubelet[1967]: E0517 00:33:41.585884 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.585906 kubelet[1967]: W0517 00:33:41.585901 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.585988 kubelet[1967]: E0517 00:33:41.585912 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.586213 kubelet[1967]: E0517 00:33:41.586188 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.586213 kubelet[1967]: W0517 00:33:41.586206 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.586213 kubelet[1967]: E0517 00:33:41.586217 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.587154 kubelet[1967]: I0517 00:33:41.586699 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-9546fdfdd-mjrz5" podStartSLOduration=1.5388646320000001 podStartE2EDuration="5.586688395s" podCreationTimestamp="2025-05-17 00:33:36 +0000 UTC" firstStartedPulling="2025-05-17 00:33:36.527322486 +0000 UTC m=+19.121386664" lastFinishedPulling="2025-05-17 00:33:40.575146239 +0000 UTC m=+23.169210427" observedRunningTime="2025-05-17 00:33:41.575716114 +0000 UTC m=+24.169780302" watchObservedRunningTime="2025-05-17 00:33:41.586688395 +0000 UTC m=+24.180752573" May 17 00:33:41.587298 kubelet[1967]: E0517 00:33:41.587255 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.587298 kubelet[1967]: W0517 00:33:41.587267 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.587298 kubelet[1967]: E0517 00:33:41.587280 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.589399 kubelet[1967]: E0517 00:33:41.589367 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.589399 kubelet[1967]: W0517 00:33:41.589379 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.589399 kubelet[1967]: E0517 00:33:41.589391 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.589630 kubelet[1967]: E0517 00:33:41.589610 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.589630 kubelet[1967]: W0517 00:33:41.589625 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.589712 kubelet[1967]: E0517 00:33:41.589636 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.589857 kubelet[1967]: E0517 00:33:41.589829 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.589857 kubelet[1967]: W0517 00:33:41.589840 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.589857 kubelet[1967]: E0517 00:33:41.589850 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.590205 kubelet[1967]: E0517 00:33:41.590161 1967 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:41.590205 kubelet[1967]: W0517 00:33:41.590189 1967 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:41.590205 kubelet[1967]: E0517 00:33:41.590198 1967 plugins.go:703] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:41.596000 audit[2626]: NETFILTER_CFG table=filter:99 family=2 entries=21 op=nft_register_rule pid=2626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:41.596000 audit[2626]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc6e3b4700 a2=0 a3=7ffc6e3b46ec items=0 ppid=2086 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:41.596000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:41.600000 audit[2626]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2626 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:41.600000 audit[2626]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc6e3b4700 a2=0 a3=7ffc6e3b46ec items=0 ppid=2086 pid=2626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:41.600000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:41.873009 env[1214]: time="2025-05-17T00:33:41.872874733Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:41.876330 env[1214]: time="2025-05-17T00:33:41.876270262Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:41.878084 env[1214]: time="2025-05-17T00:33:41.878048479Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:41.879810 env[1214]: time="2025-05-17T00:33:41.879770499Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:41.880368 env[1214]: time="2025-05-17T00:33:41.880334572Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:33:41.886356 env[1214]: time="2025-05-17T00:33:41.886316028Z" level=info msg="CreateContainer within sandbox \"8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:33:41.901791 env[1214]: time="2025-05-17T00:33:41.901712237Z" level=info msg="CreateContainer within sandbox \"8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017\"" May 17 00:33:41.902341 env[1214]: time="2025-05-17T00:33:41.902314088Z" level=info msg="StartContainer for \"b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017\"" May 17 00:33:41.932668 systemd[1]: run-containerd-runc-k8s.io-b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017-runc.S5k5OP.mount: Deactivated successfully. May 17 00:33:41.935988 systemd[1]: Started cri-containerd-b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017.scope. May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f97202cca88 items=0 ppid=2452 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:41.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316261383664643738623336376139393462623735333632636431 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit: BPF prog-id=127 op=LOAD May 17 00:33:41.950000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022c7e8 items=0 ppid=2452 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:41.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316261383664643738623336376139393462623735333632636431 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit: BPF prog-id=128 op=LOAD May 17 00:33:41.950000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022c838 items=0 ppid=2452 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:41.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316261383664643738623336376139393462623735333632636431 May 17 00:33:41.950000 audit: BPF prog-id=128 op=UNLOAD May 17 00:33:41.950000 audit: BPF prog-id=127 op=UNLOAD May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { perfmon } for pid=2634 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit[2634]: AVC avc: denied { bpf } for pid=2634 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:41.950000 audit: BPF prog-id=129 op=LOAD May 17 00:33:41.950000 audit[2634]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022c8c8 items=0 ppid=2452 pid=2634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:41.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233316261383664643738623336376139393462623735333632636431 May 17 00:33:41.970921 systemd[1]: cri-containerd-b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017.scope: Deactivated successfully. May 17 00:33:41.973000 audit: BPF prog-id=129 op=UNLOAD May 17 00:33:42.295416 env[1214]: time="2025-05-17T00:33:42.295362854Z" level=info msg="StartContainer for \"b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017\" returns successfully" May 17 00:33:42.328488 env[1214]: time="2025-05-17T00:33:42.328439232Z" level=info msg="shim disconnected" id=b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017 May 17 00:33:42.328488 env[1214]: time="2025-05-17T00:33:42.328485267Z" level=warning msg="cleaning up after shim disconnected" id=b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017 namespace=k8s.io May 17 00:33:42.328647 env[1214]: time="2025-05-17T00:33:42.328494186Z" level=info msg="cleaning up dead shim" May 17 00:33:42.334660 env[1214]: time="2025-05-17T00:33:42.334598743Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:33:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2672 runtime=io.containerd.runc.v2\n" May 17 00:33:42.509014 kubelet[1967]: E0517 00:33:42.508954 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:42.566806 kubelet[1967]: E0517 00:33:42.566421 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:42.568441 env[1214]: time="2025-05-17T00:33:42.568325300Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:33:42.582307 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b31ba86dd78b367a994bb75362cd123e5594a8a8cdc5f5acbba2548786a93017-rootfs.mount: Deactivated successfully. May 17 00:33:43.567659 kubelet[1967]: E0517 00:33:43.567622 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:44.509556 kubelet[1967]: E0517 00:33:44.509485 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:46.124119 env[1214]: time="2025-05-17T00:33:46.124034019Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:46.126997 env[1214]: time="2025-05-17T00:33:46.126859403Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:46.130353 env[1214]: time="2025-05-17T00:33:46.130306319Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:46.132942 env[1214]: time="2025-05-17T00:33:46.132869146Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:46.133462 env[1214]: time="2025-05-17T00:33:46.133423992Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:33:46.143247 env[1214]: time="2025-05-17T00:33:46.143160595Z" level=info msg="CreateContainer within sandbox \"8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:33:46.162627 env[1214]: time="2025-05-17T00:33:46.162563325Z" level=info msg="CreateContainer within sandbox \"8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2\"" May 17 00:33:46.163194 env[1214]: time="2025-05-17T00:33:46.163137120Z" level=info msg="StartContainer for \"96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2\"" May 17 00:33:46.179694 systemd[1]: Started cri-containerd-96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2.scope. May 17 00:33:46.190000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.199213 kernel: kauditd_printk_skb: 97 callbacks suppressed May 17 00:33:46.199373 kernel: audit: type=1400 audit(1747442026.190:996): avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.199401 kernel: audit: type=1300 audit(1747442026.190:996): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f33288d94d8 items=0 ppid=2452 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:46.190000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f33288d94d8 items=0 ppid=2452 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:46.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936663066383730303665353434326661396661623835363537346535 May 17 00:33:46.209666 kernel: audit: type=1327 audit(1747442026.190:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936663066383730303665353434326661396661623835363537346535 May 17 00:33:46.213810 kernel: audit: type=1400 audit(1747442026.191:997): avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.217429 kernel: audit: type=1400 audit(1747442026.191:997): avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.225618 kernel: audit: type=1400 audit(1747442026.191:997): avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.225720 kernel: audit: type=1400 audit(1747442026.191:997): avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.228885 kernel: audit: type=1400 audit(1747442026.191:997): avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.231985 kernel: audit: type=1400 audit(1747442026.191:997): avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.235010 kernel: audit: type=1400 audit(1747442026.191:997): avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.191000 audit: BPF prog-id=130 op=LOAD May 17 00:33:46.191000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002a1ee8 items=0 ppid=2452 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:46.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936663066383730303665353434326661396661623835363537346535 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.198000 audit: BPF prog-id=131 op=LOAD May 17 00:33:46.198000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002a1f38 items=0 ppid=2452 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:46.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936663066383730303665353434326661396661623835363537346535 May 17 00:33:46.208000 audit: BPF prog-id=131 op=UNLOAD May 17 00:33:46.208000 audit: BPF prog-id=130 op=UNLOAD May 17 00:33:46.208000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:46.208000 audit: BPF prog-id=132 op=LOAD May 17 00:33:46.208000 audit[2696]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002a1fc8 items=0 ppid=2452 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:46.208000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936663066383730303665353434326661396661623835363537346535 May 17 00:33:46.342860 env[1214]: time="2025-05-17T00:33:46.342772330Z" level=info msg="StartContainer for \"96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2\" returns successfully" May 17 00:33:46.852538 kubelet[1967]: E0517 00:33:46.852464 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:47.715327 env[1214]: time="2025-05-17T00:33:47.715245621Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:33:47.717283 systemd[1]: cri-containerd-96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2.scope: Deactivated successfully. May 17 00:33:47.722000 audit: BPF prog-id=132 op=UNLOAD May 17 00:33:47.735269 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2-rootfs.mount: Deactivated successfully. May 17 00:33:47.739232 env[1214]: time="2025-05-17T00:33:47.739164975Z" level=info msg="shim disconnected" id=96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2 May 17 00:33:47.739397 env[1214]: time="2025-05-17T00:33:47.739235247Z" level=warning msg="cleaning up after shim disconnected" id=96f0f87006e5442fa9fab856574e58946f963156a071348337bebe1e8713caf2 namespace=k8s.io May 17 00:33:47.739397 env[1214]: time="2025-05-17T00:33:47.739250679Z" level=info msg="cleaning up dead shim" May 17 00:33:47.745833 env[1214]: time="2025-05-17T00:33:47.745790082Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:33:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2738 runtime=io.containerd.runc.v2\n" May 17 00:33:47.778628 kubelet[1967]: I0517 00:33:47.778575 1967 kubelet_node_status.go:501] "Fast updating node status as it just became ready" May 17 00:33:47.819598 systemd[1]: Created slice kubepods-besteffort-podaec422ae_19e1_4630_8933_7f2a3ed5b7dc.slice. May 17 00:33:47.827693 systemd[1]: Created slice kubepods-burstable-poded378fdd_93ad_4dac_aafd_61b13548bb53.slice. May 17 00:33:47.832536 kubelet[1967]: I0517 00:33:47.832494 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ed378fdd-93ad-4dac-aafd-61b13548bb53-config-volume\") pod \"coredns-674b8bbfcf-xv8q2\" (UID: \"ed378fdd-93ad-4dac-aafd-61b13548bb53\") " pod="kube-system/coredns-674b8bbfcf-xv8q2" May 17 00:33:47.832536 kubelet[1967]: I0517 00:33:47.832546 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6zp8b\" (UniqueName: \"kubernetes.io/projected/ed378fdd-93ad-4dac-aafd-61b13548bb53-kube-api-access-6zp8b\") pod \"coredns-674b8bbfcf-xv8q2\" (UID: \"ed378fdd-93ad-4dac-aafd-61b13548bb53\") " pod="kube-system/coredns-674b8bbfcf-xv8q2" May 17 00:33:47.832815 kubelet[1967]: I0517 00:33:47.832574 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-backend-key-pair\") pod \"whisker-6879d654d8-5jtft\" (UID: \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\") " pod="calico-system/whisker-6879d654d8-5jtft" May 17 00:33:47.832815 kubelet[1967]: I0517 00:33:47.832606 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-g8g99\" (UniqueName: \"kubernetes.io/projected/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-kube-api-access-g8g99\") pod \"whisker-6879d654d8-5jtft\" (UID: \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\") " pod="calico-system/whisker-6879d654d8-5jtft" May 17 00:33:47.832815 kubelet[1967]: I0517 00:33:47.832649 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-ca-bundle\") pod \"whisker-6879d654d8-5jtft\" (UID: \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\") " pod="calico-system/whisker-6879d654d8-5jtft" May 17 00:33:47.836486 systemd[1]: Created slice kubepods-besteffort-pod157d8a8b_b79c_4a8c_936e_7a1b77262093.slice. May 17 00:33:47.840896 systemd[1]: Created slice kubepods-burstable-podf9ab2ff4_724f_4f25_a7c8_065a4cf72fd1.slice. May 17 00:33:47.847819 systemd[1]: Created slice kubepods-besteffort-pod5853ea90_86a9_4202_bfdd_da96ffcf909f.slice. May 17 00:33:47.855937 systemd[1]: Created slice kubepods-besteffort-pod880e53bc_71af_47ea_ad2d_ce9dfe939fad.slice. May 17 00:33:47.860536 systemd[1]: Created slice kubepods-besteffort-pod7a8e0eef_ddac_4da9_91c0_25695122d2d3.slice. May 17 00:33:47.864245 env[1214]: time="2025-05-17T00:33:47.864189451Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:33:47.866652 systemd[1]: Created slice kubepods-besteffort-pod6355ee6b_a9d4_44f9_9931_2ea96bcf14a7.slice. May 17 00:33:47.933575 kubelet[1967]: I0517 00:33:47.933525 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/157d8a8b-b79c-4a8c-936e-7a1b77262093-calico-apiserver-certs\") pod \"calico-apiserver-7b44b7576b-gz6w9\" (UID: \"157d8a8b-b79c-4a8c-936e-7a1b77262093\") " pod="calico-apiserver/calico-apiserver-7b44b7576b-gz6w9" May 17 00:33:47.933963 kubelet[1967]: I0517 00:33:47.933564 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jkgtr\" (UniqueName: \"kubernetes.io/projected/f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1-kube-api-access-jkgtr\") pod \"coredns-674b8bbfcf-dpsr2\" (UID: \"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1\") " pod="kube-system/coredns-674b8bbfcf-dpsr2" May 17 00:33:47.933963 kubelet[1967]: I0517 00:33:47.933616 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/6355ee6b-a9d4-44f9-9931-2ea96bcf14a7-goldmane-key-pair\") pod \"goldmane-78d55f7ddc-vhb9n\" (UID: \"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7\") " pod="calico-system/goldmane-78d55f7ddc-vhb9n" May 17 00:33:47.933963 kubelet[1967]: I0517 00:33:47.933637 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6x7j5\" (UniqueName: \"kubernetes.io/projected/7a8e0eef-ddac-4da9-91c0-25695122d2d3-kube-api-access-6x7j5\") pod \"calico-kube-controllers-7d4d498b95-mp7lh\" (UID: \"7a8e0eef-ddac-4da9-91c0-25695122d2d3\") " pod="calico-system/calico-kube-controllers-7d4d498b95-mp7lh" May 17 00:33:47.933963 kubelet[1967]: I0517 00:33:47.933672 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/6355ee6b-a9d4-44f9-9931-2ea96bcf14a7-config\") pod \"goldmane-78d55f7ddc-vhb9n\" (UID: \"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7\") " pod="calico-system/goldmane-78d55f7ddc-vhb9n" May 17 00:33:47.933963 kubelet[1967]: I0517 00:33:47.933692 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5853ea90-86a9-4202-bfdd-da96ffcf909f-calico-apiserver-certs\") pod \"calico-apiserver-84df797bd4-qdn5m\" (UID: \"5853ea90-86a9-4202-bfdd-da96ffcf909f\") " pod="calico-apiserver/calico-apiserver-84df797bd4-qdn5m" May 17 00:33:47.934146 kubelet[1967]: I0517 00:33:47.933712 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5z998\" (UniqueName: \"kubernetes.io/projected/880e53bc-71af-47ea-ad2d-ce9dfe939fad-kube-api-access-5z998\") pod \"calico-apiserver-84df797bd4-hhlmn\" (UID: \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\") " pod="calico-apiserver/calico-apiserver-84df797bd4-hhlmn" May 17 00:33:47.934146 kubelet[1967]: I0517 00:33:47.933741 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5xqs8\" (UniqueName: \"kubernetes.io/projected/6355ee6b-a9d4-44f9-9931-2ea96bcf14a7-kube-api-access-5xqs8\") pod \"goldmane-78d55f7ddc-vhb9n\" (UID: \"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7\") " pod="calico-system/goldmane-78d55f7ddc-vhb9n" May 17 00:33:47.934146 kubelet[1967]: I0517 00:33:47.933765 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7a8e0eef-ddac-4da9-91c0-25695122d2d3-tigera-ca-bundle\") pod \"calico-kube-controllers-7d4d498b95-mp7lh\" (UID: \"7a8e0eef-ddac-4da9-91c0-25695122d2d3\") " pod="calico-system/calico-kube-controllers-7d4d498b95-mp7lh" May 17 00:33:47.934146 kubelet[1967]: I0517 00:33:47.933806 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6355ee6b-a9d4-44f9-9931-2ea96bcf14a7-goldmane-ca-bundle\") pod \"goldmane-78d55f7ddc-vhb9n\" (UID: \"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7\") " pod="calico-system/goldmane-78d55f7ddc-vhb9n" May 17 00:33:47.934146 kubelet[1967]: I0517 00:33:47.933826 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l52cc\" (UniqueName: \"kubernetes.io/projected/5853ea90-86a9-4202-bfdd-da96ffcf909f-kube-api-access-l52cc\") pod \"calico-apiserver-84df797bd4-qdn5m\" (UID: \"5853ea90-86a9-4202-bfdd-da96ffcf909f\") " pod="calico-apiserver/calico-apiserver-84df797bd4-qdn5m" May 17 00:33:47.934324 kubelet[1967]: I0517 00:33:47.933845 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/880e53bc-71af-47ea-ad2d-ce9dfe939fad-calico-apiserver-certs\") pod \"calico-apiserver-84df797bd4-hhlmn\" (UID: \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\") " pod="calico-apiserver/calico-apiserver-84df797bd4-hhlmn" May 17 00:33:47.934324 kubelet[1967]: I0517 00:33:47.933878 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wxw9n\" (UniqueName: \"kubernetes.io/projected/157d8a8b-b79c-4a8c-936e-7a1b77262093-kube-api-access-wxw9n\") pod \"calico-apiserver-7b44b7576b-gz6w9\" (UID: \"157d8a8b-b79c-4a8c-936e-7a1b77262093\") " pod="calico-apiserver/calico-apiserver-7b44b7576b-gz6w9" May 17 00:33:47.934324 kubelet[1967]: I0517 00:33:47.933902 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1-config-volume\") pod \"coredns-674b8bbfcf-dpsr2\" (UID: \"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1\") " pod="kube-system/coredns-674b8bbfcf-dpsr2" May 17 00:33:48.124169 env[1214]: time="2025-05-17T00:33:48.124110872Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6879d654d8-5jtft,Uid:aec422ae-19e1-4630-8933-7f2a3ed5b7dc,Namespace:calico-system,Attempt:0,}" May 17 00:33:48.133467 kubelet[1967]: E0517 00:33:48.133440 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:48.133972 env[1214]: time="2025-05-17T00:33:48.133917639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xv8q2,Uid:ed378fdd-93ad-4dac-aafd-61b13548bb53,Namespace:kube-system,Attempt:0,}" May 17 00:33:48.139027 env[1214]: time="2025-05-17T00:33:48.138995693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b44b7576b-gz6w9,Uid:157d8a8b-b79c-4a8c-936e-7a1b77262093,Namespace:calico-apiserver,Attempt:0,}" May 17 00:33:48.144317 kubelet[1967]: E0517 00:33:48.144287 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:48.144734 env[1214]: time="2025-05-17T00:33:48.144699923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-dpsr2,Uid:f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1,Namespace:kube-system,Attempt:0,}" May 17 00:33:48.153345 env[1214]: time="2025-05-17T00:33:48.153299562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-qdn5m,Uid:5853ea90-86a9-4202-bfdd-da96ffcf909f,Namespace:calico-apiserver,Attempt:0,}" May 17 00:33:48.158330 env[1214]: time="2025-05-17T00:33:48.158287692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-hhlmn,Uid:880e53bc-71af-47ea-ad2d-ce9dfe939fad,Namespace:calico-apiserver,Attempt:0,}" May 17 00:33:48.166488 env[1214]: time="2025-05-17T00:33:48.166441773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4d498b95-mp7lh,Uid:7a8e0eef-ddac-4da9-91c0-25695122d2d3,Namespace:calico-system,Attempt:0,}" May 17 00:33:48.171826 env[1214]: time="2025-05-17T00:33:48.171785168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vhb9n,Uid:6355ee6b-a9d4-44f9-9931-2ea96bcf14a7,Namespace:calico-system,Attempt:0,}" May 17 00:33:48.218219 env[1214]: time="2025-05-17T00:33:48.218140257Z" level=error msg="Failed to destroy network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.218615 env[1214]: time="2025-05-17T00:33:48.218576656Z" level=error msg="encountered an error cleaning up failed sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.218717 env[1214]: time="2025-05-17T00:33:48.218641748Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xv8q2,Uid:ed378fdd-93ad-4dac-aafd-61b13548bb53,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.218950 kubelet[1967]: E0517 00:33:48.218901 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.219170 kubelet[1967]: E0517 00:33:48.218994 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-xv8q2" May 17 00:33:48.219170 kubelet[1967]: E0517 00:33:48.219030 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-xv8q2" May 17 00:33:48.219170 kubelet[1967]: E0517 00:33:48.219105 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-xv8q2_kube-system(ed378fdd-93ad-4dac-aafd-61b13548bb53)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-xv8q2_kube-system(ed378fdd-93ad-4dac-aafd-61b13548bb53)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-xv8q2" podUID="ed378fdd-93ad-4dac-aafd-61b13548bb53" May 17 00:33:48.220980 env[1214]: time="2025-05-17T00:33:48.220933287Z" level=error msg="Failed to destroy network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.221390 env[1214]: time="2025-05-17T00:33:48.221352781Z" level=error msg="encountered an error cleaning up failed sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.221452 env[1214]: time="2025-05-17T00:33:48.221432593Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6879d654d8-5jtft,Uid:aec422ae-19e1-4630-8933-7f2a3ed5b7dc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.221647 kubelet[1967]: E0517 00:33:48.221615 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.221730 kubelet[1967]: E0517 00:33:48.221663 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6879d654d8-5jtft" May 17 00:33:48.221730 kubelet[1967]: E0517 00:33:48.221688 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6879d654d8-5jtft" May 17 00:33:48.221819 kubelet[1967]: E0517 00:33:48.221737 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6879d654d8-5jtft_calico-system(aec422ae-19e1-4630-8933-7f2a3ed5b7dc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6879d654d8-5jtft_calico-system(aec422ae-19e1-4630-8933-7f2a3ed5b7dc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6879d654d8-5jtft" podUID="aec422ae-19e1-4630-8933-7f2a3ed5b7dc" May 17 00:33:48.307456 env[1214]: time="2025-05-17T00:33:48.307396058Z" level=error msg="Failed to destroy network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.307768 env[1214]: time="2025-05-17T00:33:48.307739557Z" level=error msg="encountered an error cleaning up failed sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.307828 env[1214]: time="2025-05-17T00:33:48.307783847Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b44b7576b-gz6w9,Uid:157d8a8b-b79c-4a8c-936e-7a1b77262093,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.307978 kubelet[1967]: E0517 00:33:48.307945 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.308045 kubelet[1967]: E0517 00:33:48.307994 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b44b7576b-gz6w9" May 17 00:33:48.308045 kubelet[1967]: E0517 00:33:48.308016 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7b44b7576b-gz6w9" May 17 00:33:48.308125 kubelet[1967]: E0517 00:33:48.308056 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7b44b7576b-gz6w9_calico-apiserver(157d8a8b-b79c-4a8c-936e-7a1b77262093)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7b44b7576b-gz6w9_calico-apiserver(157d8a8b-b79c-4a8c-936e-7a1b77262093)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b44b7576b-gz6w9" podUID="157d8a8b-b79c-4a8c-936e-7a1b77262093" May 17 00:33:48.322282 env[1214]: time="2025-05-17T00:33:48.322220085Z" level=error msg="Failed to destroy network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.322761 env[1214]: time="2025-05-17T00:33:48.322731658Z" level=error msg="encountered an error cleaning up failed sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.322871 env[1214]: time="2025-05-17T00:33:48.322842543Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-qdn5m,Uid:5853ea90-86a9-4202-bfdd-da96ffcf909f,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.324233 kubelet[1967]: E0517 00:33:48.323282 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.324233 kubelet[1967]: E0517 00:33:48.323335 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84df797bd4-qdn5m" May 17 00:33:48.324233 kubelet[1967]: E0517 00:33:48.323352 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84df797bd4-qdn5m" May 17 00:33:48.324386 kubelet[1967]: E0517 00:33:48.323404 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-84df797bd4-qdn5m_calico-apiserver(5853ea90-86a9-4202-bfdd-da96ffcf909f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-84df797bd4-qdn5m_calico-apiserver(5853ea90-86a9-4202-bfdd-da96ffcf909f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84df797bd4-qdn5m" podUID="5853ea90-86a9-4202-bfdd-da96ffcf909f" May 17 00:33:48.329539 env[1214]: time="2025-05-17T00:33:48.329476457Z" level=error msg="Failed to destroy network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.329879 env[1214]: time="2025-05-17T00:33:48.329843565Z" level=error msg="encountered an error cleaning up failed sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.329914 env[1214]: time="2025-05-17T00:33:48.329893467Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-hhlmn,Uid:880e53bc-71af-47ea-ad2d-ce9dfe939fad,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.330161 kubelet[1967]: E0517 00:33:48.330114 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.330251 kubelet[1967]: E0517 00:33:48.330185 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84df797bd4-hhlmn" May 17 00:33:48.330251 kubelet[1967]: E0517 00:33:48.330206 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-84df797bd4-hhlmn" May 17 00:33:48.330345 env[1214]: time="2025-05-17T00:33:48.330136952Z" level=error msg="Failed to destroy network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.330374 kubelet[1967]: E0517 00:33:48.330256 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-84df797bd4-hhlmn_calico-apiserver(880e53bc-71af-47ea-ad2d-ce9dfe939fad)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-84df797bd4-hhlmn_calico-apiserver(880e53bc-71af-47ea-ad2d-ce9dfe939fad)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84df797bd4-hhlmn" podUID="880e53bc-71af-47ea-ad2d-ce9dfe939fad" May 17 00:33:48.330552 env[1214]: time="2025-05-17T00:33:48.330527638Z" level=error msg="encountered an error cleaning up failed sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.330707 env[1214]: time="2025-05-17T00:33:48.330663846Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-dpsr2,Uid:f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.330955 kubelet[1967]: E0517 00:33:48.330872 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.330955 kubelet[1967]: E0517 00:33:48.330941 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-dpsr2" May 17 00:33:48.331135 kubelet[1967]: E0517 00:33:48.330962 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-674b8bbfcf-dpsr2" May 17 00:33:48.331135 kubelet[1967]: E0517 00:33:48.331017 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-674b8bbfcf-dpsr2_kube-system(f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-674b8bbfcf-dpsr2_kube-system(f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-dpsr2" podUID="f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1" May 17 00:33:48.334007 env[1214]: time="2025-05-17T00:33:48.333953487Z" level=error msg="Failed to destroy network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.334457 env[1214]: time="2025-05-17T00:33:48.334413314Z" level=error msg="encountered an error cleaning up failed sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.334613 env[1214]: time="2025-05-17T00:33:48.334483036Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4d498b95-mp7lh,Uid:7a8e0eef-ddac-4da9-91c0-25695122d2d3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.334729 kubelet[1967]: E0517 00:33:48.334692 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.334795 kubelet[1967]: E0517 00:33:48.334747 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d4d498b95-mp7lh" May 17 00:33:48.334795 kubelet[1967]: E0517 00:33:48.334767 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7d4d498b95-mp7lh" May 17 00:33:48.334850 kubelet[1967]: E0517 00:33:48.334812 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7d4d498b95-mp7lh_calico-system(7a8e0eef-ddac-4da9-91c0-25695122d2d3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7d4d498b95-mp7lh_calico-system(7a8e0eef-ddac-4da9-91c0-25695122d2d3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d4d498b95-mp7lh" podUID="7a8e0eef-ddac-4da9-91c0-25695122d2d3" May 17 00:33:48.337354 env[1214]: time="2025-05-17T00:33:48.337303301Z" level=error msg="Failed to destroy network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.337654 env[1214]: time="2025-05-17T00:33:48.337613613Z" level=error msg="encountered an error cleaning up failed sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.337732 env[1214]: time="2025-05-17T00:33:48.337667093Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vhb9n,Uid:6355ee6b-a9d4-44f9-9931-2ea96bcf14a7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.338036 kubelet[1967]: E0517 00:33:48.337868 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.338036 kubelet[1967]: E0517 00:33:48.337920 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-vhb9n" May 17 00:33:48.338036 kubelet[1967]: E0517 00:33:48.337949 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-78d55f7ddc-vhb9n" May 17 00:33:48.338168 kubelet[1967]: E0517 00:33:48.338002 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-78d55f7ddc-vhb9n_calico-system(6355ee6b-a9d4-44f9-9931-2ea96bcf14a7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-78d55f7ddc-vhb9n_calico-system(6355ee6b-a9d4-44f9-9931-2ea96bcf14a7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:33:48.514289 systemd[1]: Created slice kubepods-besteffort-pod34edfeda_9b15_4dd5_8e02_698e32cac2dc.slice. May 17 00:33:48.516717 env[1214]: time="2025-05-17T00:33:48.516668382Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6g96,Uid:34edfeda-9b15-4dd5-8e02-698e32cac2dc,Namespace:calico-system,Attempt:0,}" May 17 00:33:48.864332 kubelet[1967]: I0517 00:33:48.864298 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:33:48.864813 env[1214]: time="2025-05-17T00:33:48.864782827Z" level=info msg="StopPodSandbox for \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\"" May 17 00:33:48.865166 kubelet[1967]: I0517 00:33:48.865134 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:33:48.865492 env[1214]: time="2025-05-17T00:33:48.865467332Z" level=info msg="StopPodSandbox for \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\"" May 17 00:33:48.867344 kubelet[1967]: I0517 00:33:48.867321 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:33:48.867837 env[1214]: time="2025-05-17T00:33:48.867804333Z" level=info msg="StopPodSandbox for \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\"" May 17 00:33:48.870078 kubelet[1967]: I0517 00:33:48.869643 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:33:48.870707 env[1214]: time="2025-05-17T00:33:48.870545567Z" level=info msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\"" May 17 00:33:48.871288 kubelet[1967]: I0517 00:33:48.871264 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:33:48.871750 env[1214]: time="2025-05-17T00:33:48.871723115Z" level=info msg="StopPodSandbox for \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\"" May 17 00:33:48.872705 kubelet[1967]: I0517 00:33:48.872684 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:33:48.873145 env[1214]: time="2025-05-17T00:33:48.873121193Z" level=info msg="StopPodSandbox for \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\"" May 17 00:33:48.874105 kubelet[1967]: I0517 00:33:48.874072 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:33:48.874629 env[1214]: time="2025-05-17T00:33:48.874576057Z" level=info msg="StopPodSandbox for \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\"" May 17 00:33:48.875532 kubelet[1967]: I0517 00:33:48.875497 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:33:48.875915 env[1214]: time="2025-05-17T00:33:48.875875133Z" level=info msg="StopPodSandbox for \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\"" May 17 00:33:48.891368 env[1214]: time="2025-05-17T00:33:48.891312751Z" level=error msg="StopPodSandbox for \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\" failed" error="failed to destroy network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.891910 kubelet[1967]: E0517 00:33:48.891739 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:33:48.891910 kubelet[1967]: E0517 00:33:48.891798 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388"} May 17 00:33:48.891910 kubelet[1967]: E0517 00:33:48.891858 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.891910 kubelet[1967]: E0517 00:33:48.891880 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84df797bd4-hhlmn" podUID="880e53bc-71af-47ea-ad2d-ce9dfe939fad" May 17 00:33:48.900220 env[1214]: time="2025-05-17T00:33:48.900132868Z" level=error msg="StopPodSandbox for \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\" failed" error="failed to destroy network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.900733 kubelet[1967]: E0517 00:33:48.900574 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:33:48.900733 kubelet[1967]: E0517 00:33:48.900635 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0"} May 17 00:33:48.900733 kubelet[1967]: E0517 00:33:48.900665 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ed378fdd-93ad-4dac-aafd-61b13548bb53\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.900733 kubelet[1967]: E0517 00:33:48.900690 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ed378fdd-93ad-4dac-aafd-61b13548bb53\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-xv8q2" podUID="ed378fdd-93ad-4dac-aafd-61b13548bb53" May 17 00:33:48.928852 env[1214]: time="2025-05-17T00:33:48.928778652Z" level=error msg="StopPodSandbox for \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\" failed" error="failed to destroy network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.929689 kubelet[1967]: E0517 00:33:48.929537 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:33:48.929689 kubelet[1967]: E0517 00:33:48.929586 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19"} May 17 00:33:48.929689 kubelet[1967]: E0517 00:33:48.929629 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.929689 kubelet[1967]: E0517 00:33:48.929652 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-674b8bbfcf-dpsr2" podUID="f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1" May 17 00:33:48.933408 env[1214]: time="2025-05-17T00:33:48.933349523Z" level=error msg="StopPodSandbox for \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\" failed" error="failed to destroy network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.933620 kubelet[1967]: E0517 00:33:48.933577 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:33:48.933868 kubelet[1967]: E0517 00:33:48.933646 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0"} May 17 00:33:48.933868 kubelet[1967]: E0517 00:33:48.933684 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.933868 kubelet[1967]: E0517 00:33:48.933720 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:33:48.940200 env[1214]: time="2025-05-17T00:33:48.940091126Z" level=error msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" failed" error="failed to destroy network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.941013 env[1214]: time="2025-05-17T00:33:48.940958152Z" level=error msg="StopPodSandbox for \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\" failed" error="failed to destroy network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.941397 kubelet[1967]: E0517 00:33:48.941352 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:33:48.941500 kubelet[1967]: E0517 00:33:48.941406 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab"} May 17 00:33:48.941500 kubelet[1967]: E0517 00:33:48.941439 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7a8e0eef-ddac-4da9-91c0-25695122d2d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.941500 kubelet[1967]: E0517 00:33:48.941467 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7a8e0eef-ddac-4da9-91c0-25695122d2d3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7d4d498b95-mp7lh" podUID="7a8e0eef-ddac-4da9-91c0-25695122d2d3" May 17 00:33:48.941500 kubelet[1967]: E0517 00:33:48.941493 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:33:48.941686 kubelet[1967]: E0517 00:33:48.941509 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3"} May 17 00:33:48.941686 kubelet[1967]: E0517 00:33:48.941524 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5853ea90-86a9-4202-bfdd-da96ffcf909f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.941686 kubelet[1967]: E0517 00:33:48.941541 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5853ea90-86a9-4202-bfdd-da96ffcf909f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-84df797bd4-qdn5m" podUID="5853ea90-86a9-4202-bfdd-da96ffcf909f" May 17 00:33:48.945083 env[1214]: time="2025-05-17T00:33:48.945032592Z" level=error msg="StopPodSandbox for \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\" failed" error="failed to destroy network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.945255 kubelet[1967]: E0517 00:33:48.945228 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:33:48.945307 kubelet[1967]: E0517 00:33:48.945270 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996"} May 17 00:33:48.945307 kubelet[1967]: E0517 00:33:48.945295 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.945395 kubelet[1967]: E0517 00:33:48.945313 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6879d654d8-5jtft" podUID="aec422ae-19e1-4630-8933-7f2a3ed5b7dc" May 17 00:33:48.947665 env[1214]: time="2025-05-17T00:33:48.947593179Z" level=error msg="StopPodSandbox for \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\" failed" error="failed to destroy network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.947917 kubelet[1967]: E0517 00:33:48.947860 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:33:48.948100 kubelet[1967]: E0517 00:33:48.947934 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61"} May 17 00:33:48.948100 kubelet[1967]: E0517 00:33:48.947987 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"157d8a8b-b79c-4a8c-936e-7a1b77262093\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:48.948100 kubelet[1967]: E0517 00:33:48.948026 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"157d8a8b-b79c-4a8c-936e-7a1b77262093\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7b44b7576b-gz6w9" podUID="157d8a8b-b79c-4a8c-936e-7a1b77262093" May 17 00:33:48.993208 env[1214]: time="2025-05-17T00:33:48.993121182Z" level=error msg="Failed to destroy network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.993549 env[1214]: time="2025-05-17T00:33:48.993515015Z" level=error msg="encountered an error cleaning up failed sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.993592 env[1214]: time="2025-05-17T00:33:48.993569917Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6g96,Uid:34edfeda-9b15-4dd5-8e02-698e32cac2dc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.993837 kubelet[1967]: E0517 00:33:48.993795 1967 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:48.993921 kubelet[1967]: E0517 00:33:48.993861 1967 kuberuntime_sandbox.go:70] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t6g96" May 17 00:33:48.993921 kubelet[1967]: E0517 00:33:48.993879 1967 kuberuntime_manager.go:1252] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t6g96" May 17 00:33:48.993987 kubelet[1967]: E0517 00:33:48.993926 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-t6g96_calico-system(34edfeda-9b15-4dd5-8e02-698e32cac2dc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-t6g96_calico-system(34edfeda-9b15-4dd5-8e02-698e32cac2dc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:48.995883 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207-shm.mount: Deactivated successfully. May 17 00:33:49.878724 kubelet[1967]: I0517 00:33:49.878680 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:33:49.879323 env[1214]: time="2025-05-17T00:33:49.879262379Z" level=info msg="StopPodSandbox for \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\"" May 17 00:33:49.903615 env[1214]: time="2025-05-17T00:33:49.903543009Z" level=error msg="StopPodSandbox for \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\" failed" error="failed to destroy network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:49.903855 kubelet[1967]: E0517 00:33:49.903819 1967 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:33:49.903918 kubelet[1967]: E0517 00:33:49.903868 1967 kuberuntime_manager.go:1586] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207"} May 17 00:33:49.903918 kubelet[1967]: E0517 00:33:49.903902 1967 kuberuntime_manager.go:1161] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"34edfeda-9b15-4dd5-8e02-698e32cac2dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:49.904012 kubelet[1967]: E0517 00:33:49.903933 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"34edfeda-9b15-4dd5-8e02-698e32cac2dc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t6g96" podUID="34edfeda-9b15-4dd5-8e02-698e32cac2dc" May 17 00:33:53.449248 systemd[1]: Started sshd@7-10.0.0.66:22-10.0.0.1:47380.service. May 17 00:33:53.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.66:22-10.0.0.1:47380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.450542 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:33:53.450624 kernel: audit: type=1130 audit(1747442033.448:1003): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.66:22-10.0.0.1:47380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.489000 audit[3237]: USER_ACCT pid=3237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.492082 sshd[3237]: Accepted publickey for core from 10.0.0.1 port 47380 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:33:53.494000 audit[3237]: CRED_ACQ pid=3237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.499695 kernel: audit: type=1101 audit(1747442033.489:1004): pid=3237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.499800 kernel: audit: type=1103 audit(1747442033.494:1005): pid=3237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.499824 kernel: audit: type=1006 audit(1747442033.494:1006): pid=3237 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 17 00:33:53.496131 sshd[3237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:33:53.501110 systemd[1]: Started session-8.scope. May 17 00:33:53.502354 systemd-logind[1203]: New session 8 of user core. May 17 00:33:53.507298 kernel: audit: type=1300 audit(1747442033.494:1006): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc8ffa2a0 a2=3 a3=0 items=0 ppid=1 pid=3237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:53.494000 audit[3237]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc8ffa2a0 a2=3 a3=0 items=0 ppid=1 pid=3237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:53.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:33:53.509334 kernel: audit: type=1327 audit(1747442033.494:1006): proctitle=737368643A20636F7265205B707269765D May 17 00:33:53.506000 audit[3237]: USER_START pid=3237 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.516224 kernel: audit: type=1105 audit(1747442033.506:1007): pid=3237 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.516482 kernel: audit: type=1103 audit(1747442033.510:1008): pid=3239 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.510000 audit[3239]: CRED_ACQ pid=3239 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.716618 sshd[3237]: pam_unix(sshd:session): session closed for user core May 17 00:33:53.727098 kernel: audit: type=1106 audit(1747442033.717:1009): pid=3237 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.727265 kernel: audit: type=1104 audit(1747442033.717:1010): pid=3237 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.717000 audit[3237]: USER_END pid=3237 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.717000 audit[3237]: CRED_DISP pid=3237 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:53.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.66:22-10.0.0.1:47380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:53.719812 systemd[1]: sshd@7-10.0.0.66:22-10.0.0.1:47380.service: Deactivated successfully. May 17 00:33:53.720474 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:33:53.728343 systemd-logind[1203]: Session 8 logged out. Waiting for processes to exit. May 17 00:33:53.729142 systemd-logind[1203]: Removed session 8. May 17 00:33:57.148492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2658779714.mount: Deactivated successfully. May 17 00:33:58.632866 kubelet[1967]: E0517 00:33:58.632791 1967 kubelet.go:2627] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.124s" May 17 00:33:58.662402 env[1214]: time="2025-05-17T00:33:58.662338176Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.667664 env[1214]: time="2025-05-17T00:33:58.667598818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.672957 env[1214]: time="2025-05-17T00:33:58.672908610Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.674790 env[1214]: time="2025-05-17T00:33:58.674722741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.675145 env[1214]: time="2025-05-17T00:33:58.675102833Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:33:58.690269 env[1214]: time="2025-05-17T00:33:58.690209358Z" level=info msg="CreateContainer within sandbox \"8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:33:58.712294 env[1214]: time="2025-05-17T00:33:58.712234646Z" level=info msg="CreateContainer within sandbox \"8ef4ef9eb2a9b127ef894b655f6e2938ca01f6848ac49191be6da5d843131612\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b688ff8301184ae5cd21cb257fb44e38880f2c57a45c56b63e6d983a724969e5\"" May 17 00:33:58.712834 env[1214]: time="2025-05-17T00:33:58.712805148Z" level=info msg="StartContainer for \"b688ff8301184ae5cd21cb257fb44e38880f2c57a45c56b63e6d983a724969e5\"" May 17 00:33:58.726409 systemd[1]: Started sshd@8-10.0.0.66:22-10.0.0.1:34008.service. May 17 00:33:58.729358 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:33:58.729420 kernel: audit: type=1130 audit(1747442038.725:1012): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.66:22-10.0.0.1:34008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.66:22-10.0.0.1:34008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.732874 systemd[1]: Started cri-containerd-b688ff8301184ae5cd21cb257fb44e38880f2c57a45c56b63e6d983a724969e5.scope. May 17 00:33:58.753000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f88740153c8 items=0 ppid=2452 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.764156 kernel: audit: type=1400 audit(1747442038.753:1013): avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.764239 kernel: audit: type=1300 audit(1747442038.753:1013): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f88740153c8 items=0 ppid=2452 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383866663833303131383461653563643231636232353766623434 May 17 00:33:58.770228 kernel: audit: type=1327 audit(1747442038.753:1013): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383866663833303131383461653563643231636232353766623434 May 17 00:33:58.770392 kernel: audit: type=1400 audit(1747442038.753:1014): avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.780169 kernel: audit: type=1400 audit(1747442038.753:1014): avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.781354 sshd[3272]: Accepted publickey for core from 10.0.0.1 port 34008 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.786235 sshd[3272]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:33:58.789521 kernel: audit: type=1400 audit(1747442038.753:1014): avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.789576 kernel: audit: type=1400 audit(1747442038.753:1014): avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.791711 systemd[1]: Started session-9.scope. May 17 00:33:58.792827 systemd-logind[1203]: New session 9 of user core. May 17 00:33:58.794371 kernel: audit: type=1400 audit(1747442038.753:1014): avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.799835 kernel: audit: type=1400 audit(1747442038.753:1014): avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.753000 audit: BPF prog-id=133 op=LOAD May 17 00:33:58.753000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00034e0c8 items=0 ppid=2452 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383866663833303131383461653563643231636232353766623434 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.757000 audit: BPF prog-id=134 op=LOAD May 17 00:33:58.757000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00034e118 items=0 ppid=2452 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383866663833303131383461653563643231636232353766623434 May 17 00:33:58.763000 audit: BPF prog-id=134 op=UNLOAD May 17 00:33:58.763000 audit: BPF prog-id=133 op=UNLOAD May 17 00:33:58.763000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { perfmon } for pid=3262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit[3262]: AVC avc: denied { bpf } for pid=3262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.763000 audit: BPF prog-id=135 op=LOAD May 17 00:33:58.763000 audit[3262]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00034e1a8 items=0 ppid=2452 pid=3262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236383866663833303131383461653563643231636232353766623434 May 17 00:33:58.780000 audit[3272]: USER_ACCT pid=3272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.784000 audit[3272]: CRED_ACQ pid=3272 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.784000 audit[3272]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ebf13a0 a2=3 a3=0 items=0 ppid=1 pid=3272 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.784000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:33:58.801000 audit[3272]: USER_START pid=3272 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.803000 audit[3294]: CRED_ACQ pid=3294 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.914229 env[1214]: time="2025-05-17T00:33:58.914046282Z" level=info msg="StartContainer for \"b688ff8301184ae5cd21cb257fb44e38880f2c57a45c56b63e6d983a724969e5\" returns successfully" May 17 00:33:58.964580 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:33:58.964757 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:33:59.058495 sshd[3272]: pam_unix(sshd:session): session closed for user core May 17 00:33:59.058000 audit[3272]: USER_END pid=3272 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:59.058000 audit[3272]: CRED_DISP pid=3272 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:59.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.66:22-10.0.0.1:34008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:59.061631 systemd[1]: sshd@8-10.0.0.66:22-10.0.0.1:34008.service: Deactivated successfully. May 17 00:33:59.063978 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:33:59.064945 systemd-logind[1203]: Session 9 logged out. Waiting for processes to exit. May 17 00:33:59.065916 systemd-logind[1203]: Removed session 9. May 17 00:33:59.071923 env[1214]: time="2025-05-17T00:33:59.071880779Z" level=info msg="StopPodSandbox for \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\"" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.149 [INFO][3330] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.149 [INFO][3330] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" iface="eth0" netns="/var/run/netns/cni-84fb4ff0-298d-dc36-6942-5bb09aa2cd5c" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.150 [INFO][3330] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" iface="eth0" netns="/var/run/netns/cni-84fb4ff0-298d-dc36-6942-5bb09aa2cd5c" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.150 [INFO][3330] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" iface="eth0" netns="/var/run/netns/cni-84fb4ff0-298d-dc36-6942-5bb09aa2cd5c" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.150 [INFO][3330] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.150 [INFO][3330] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.205 [INFO][3341] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.206 [INFO][3341] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.206 [INFO][3341] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.213 [WARNING][3341] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.213 [INFO][3341] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.215 [INFO][3341] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:33:59.219503 env[1214]: 2025-05-17 00:33:59.217 [INFO][3330] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:33:59.220144 env[1214]: time="2025-05-17T00:33:59.219610160Z" level=info msg="TearDown network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\" successfully" May 17 00:33:59.220144 env[1214]: time="2025-05-17T00:33:59.219651402Z" level=info msg="StopPodSandbox for \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\" returns successfully" May 17 00:33:59.311019 kubelet[1967]: I0517 00:33:59.310529 1967 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-ca-bundle\") pod \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\" (UID: \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\") " May 17 00:33:59.311019 kubelet[1967]: I0517 00:33:59.310595 1967 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-g8g99\" (UniqueName: \"kubernetes.io/projected/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-kube-api-access-g8g99\") pod \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\" (UID: \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\") " May 17 00:33:59.311019 kubelet[1967]: I0517 00:33:59.310630 1967 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-backend-key-pair\") pod \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\" (UID: \"aec422ae-19e1-4630-8933-7f2a3ed5b7dc\") " May 17 00:33:59.311019 kubelet[1967]: I0517 00:33:59.310897 1967 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "aec422ae-19e1-4630-8933-7f2a3ed5b7dc" (UID: "aec422ae-19e1-4630-8933-7f2a3ed5b7dc"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGIDValue "" May 17 00:33:59.313953 kubelet[1967]: I0517 00:33:59.313903 1967 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "aec422ae-19e1-4630-8933-7f2a3ed5b7dc" (UID: "aec422ae-19e1-4630-8933-7f2a3ed5b7dc"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:33:59.314777 kubelet[1967]: I0517 00:33:59.314749 1967 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-kube-api-access-g8g99" (OuterVolumeSpecName: "kube-api-access-g8g99") pod "aec422ae-19e1-4630-8933-7f2a3ed5b7dc" (UID: "aec422ae-19e1-4630-8933-7f2a3ed5b7dc"). InnerVolumeSpecName "kube-api-access-g8g99". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:33:59.410936 kubelet[1967]: I0517 00:33:59.410865 1967 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-g8g99\" (UniqueName: \"kubernetes.io/projected/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-kube-api-access-g8g99\") on node \"localhost\" DevicePath \"\"" May 17 00:33:59.410936 kubelet[1967]: I0517 00:33:59.410907 1967 reconciler_common.go:299] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 17 00:33:59.410936 kubelet[1967]: I0517 00:33:59.410916 1967 reconciler_common.go:299] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/aec422ae-19e1-4630-8933-7f2a3ed5b7dc-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 17 00:33:59.512101 env[1214]: time="2025-05-17T00:33:59.511957287Z" level=info msg="StopPodSandbox for \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\"" May 17 00:33:59.515573 systemd[1]: Removed slice kubepods-besteffort-podaec422ae_19e1_4630_8933_7f2a3ed5b7dc.slice. May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.556 [INFO][3373] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.556 [INFO][3373] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" iface="eth0" netns="/var/run/netns/cni-8fe77871-0955-7450-f3b6-7a585822d024" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.556 [INFO][3373] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" iface="eth0" netns="/var/run/netns/cni-8fe77871-0955-7450-f3b6-7a585822d024" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.557 [INFO][3373] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" iface="eth0" netns="/var/run/netns/cni-8fe77871-0955-7450-f3b6-7a585822d024" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.557 [INFO][3373] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.557 [INFO][3373] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.576 [INFO][3382] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.576 [INFO][3382] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.576 [INFO][3382] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.583 [WARNING][3382] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.583 [INFO][3382] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.584 [INFO][3382] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:33:59.587708 env[1214]: 2025-05-17 00:33:59.586 [INFO][3373] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:33:59.588196 env[1214]: time="2025-05-17T00:33:59.587826546Z" level=info msg="TearDown network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\" successfully" May 17 00:33:59.588196 env[1214]: time="2025-05-17T00:33:59.587858410Z" level=info msg="StopPodSandbox for \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\" returns successfully" May 17 00:33:59.588268 kubelet[1967]: E0517 00:33:59.588242 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:59.588770 env[1214]: time="2025-05-17T00:33:59.588705835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-dpsr2,Uid:f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1,Namespace:kube-system,Attempt:1,}" May 17 00:33:59.683752 systemd[1]: run-netns-cni\x2d8fe77871\x2d0955\x2d7450\x2df3b6\x2d7a585822d024.mount: Deactivated successfully. May 17 00:33:59.683849 systemd[1]: run-netns-cni\x2d84fb4ff0\x2d298d\x2ddc36\x2d6942\x2d5bb09aa2cd5c.mount: Deactivated successfully. May 17 00:33:59.683911 systemd[1]: var-lib-kubelet-pods-aec422ae\x2d19e1\x2d4630\x2d8933\x2d7f2a3ed5b7dc-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dg8g99.mount: Deactivated successfully. May 17 00:33:59.683981 systemd[1]: var-lib-kubelet-pods-aec422ae\x2d19e1\x2d4630\x2d8933\x2d7f2a3ed5b7dc-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:33:59.797688 systemd-networkd[1029]: cali6b526988fe4: Link UP May 17 00:33:59.800825 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:33:59.800961 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b526988fe4: link becomes ready May 17 00:33:59.800937 systemd-networkd[1029]: cali6b526988fe4: Gained carrier May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.622 [INFO][3390] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.632 [INFO][3390] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0 coredns-674b8bbfcf- kube-system f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1 1048 0 2025-05-17 00:33:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-dpsr2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6b526988fe4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.632 [INFO][3390] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.654 [INFO][3403] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" HandleID="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.654 [INFO][3403] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" HandleID="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001a54f0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-dpsr2", "timestamp":"2025-05-17 00:33:59.654264294 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.654 [INFO][3403] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.654 [INFO][3403] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.654 [INFO][3403] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.663 [INFO][3403] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.675 [INFO][3403] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.687 [INFO][3403] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.690 [INFO][3403] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.692 [INFO][3403] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.692 [INFO][3403] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.694 [INFO][3403] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86 May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.725 [INFO][3403] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.783 [INFO][3403] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.783 [INFO][3403] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" host="localhost" May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.783 [INFO][3403] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:33:59.864449 env[1214]: 2025-05-17 00:33:59.783 [INFO][3403] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" HandleID="k8s-pod-network.9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.865479 env[1214]: 2025-05-17 00:33:59.787 [INFO][3390] cni-plugin/k8s.go 418: Populated endpoint ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-dpsr2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b526988fe4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:33:59.865479 env[1214]: 2025-05-17 00:33:59.787 [INFO][3390] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.865479 env[1214]: 2025-05-17 00:33:59.787 [INFO][3390] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b526988fe4 ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.865479 env[1214]: 2025-05-17 00:33:59.801 [INFO][3390] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.865479 env[1214]: 2025-05-17 00:33:59.802 [INFO][3390] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1", ResourceVersion:"1048", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86", Pod:"coredns-674b8bbfcf-dpsr2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b526988fe4", MAC:"ee:cb:a4:ce:9d:a5", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:33:59.865479 env[1214]: 2025-05-17 00:33:59.862 [INFO][3390] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86" Namespace="kube-system" Pod="coredns-674b8bbfcf-dpsr2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:33:59.895057 env[1214]: time="2025-05-17T00:33:59.894944723Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:59.895057 env[1214]: time="2025-05-17T00:33:59.894999021Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:59.895057 env[1214]: time="2025-05-17T00:33:59.895011155Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:59.895385 env[1214]: time="2025-05-17T00:33:59.895220975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86 pid=3426 runtime=io.containerd.runc.v2 May 17 00:33:59.912145 systemd[1]: run-containerd-runc-k8s.io-9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86-runc.2fwdes.mount: Deactivated successfully. May 17 00:33:59.913906 systemd[1]: Started cri-containerd-9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86.scope. May 17 00:33:59.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit: BPF prog-id=136 op=LOAD May 17 00:33:59.924000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3426 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336235373138643462346135376337366432663664643738613464 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3426 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336235373138643462346135376337366432663664643738613464 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.924000 audit: BPF prog-id=137 op=LOAD May 17 00:33:59.924000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031fd80 items=0 ppid=3426 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336235373138643462346135376337366432663664643738613464 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit: BPF prog-id=138 op=LOAD May 17 00:33:59.925000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031fdc8 items=0 ppid=3426 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336235373138643462346135376337366432663664643738613464 May 17 00:33:59.925000 audit: BPF prog-id=138 op=UNLOAD May 17 00:33:59.925000 audit: BPF prog-id=137 op=UNLOAD May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { perfmon } for pid=3435 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit[3435]: AVC avc: denied { bpf } for pid=3435 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:59.925000 audit: BPF prog-id=139 op=LOAD May 17 00:33:59.925000 audit[3435]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003861d8 items=0 ppid=3426 pid=3435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964336235373138643462346135376337366432663664643738613464 May 17 00:33:59.927818 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:33:59.950918 env[1214]: time="2025-05-17T00:33:59.950854367Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-dpsr2,Uid:f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1,Namespace:kube-system,Attempt:1,} returns sandbox id \"9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86\"" May 17 00:33:59.952034 kubelet[1967]: E0517 00:33:59.951606 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:00.039057 env[1214]: time="2025-05-17T00:34:00.038998667Z" level=info msg="CreateContainer within sandbox \"9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:34:00.242494 env[1214]: time="2025-05-17T00:34:00.242304778Z" level=info msg="CreateContainer within sandbox \"9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2c3e6e432b86677b52ffc2d905662039c843000614fea474166a8de5ef9f45da\"" May 17 00:34:00.243530 env[1214]: time="2025-05-17T00:34:00.243382240Z" level=info msg="StartContainer for \"2c3e6e432b86677b52ffc2d905662039c843000614fea474166a8de5ef9f45da\"" May 17 00:34:00.258657 kubelet[1967]: I0517 00:34:00.258575 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-c7knh" podStartSLOduration=2.489440013 podStartE2EDuration="24.258554226s" podCreationTimestamp="2025-05-17 00:33:36 +0000 UTC" firstStartedPulling="2025-05-17 00:33:36.906890996 +0000 UTC m=+19.500955184" lastFinishedPulling="2025-05-17 00:33:58.676005209 +0000 UTC m=+41.270069397" observedRunningTime="2025-05-17 00:34:00.252048841 +0000 UTC m=+42.846113029" watchObservedRunningTime="2025-05-17 00:34:00.258554226 +0000 UTC m=+42.852618414" May 17 00:34:00.272269 systemd[1]: Created slice kubepods-besteffort-pod7614d727_5145_486e_8d21_b867c95fe30e.slice. May 17 00:34:00.279773 systemd[1]: Started cri-containerd-2c3e6e432b86677b52ffc2d905662039c843000614fea474166a8de5ef9f45da.scope. May 17 00:34:00.317929 kubelet[1967]: I0517 00:34:00.317701 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lb74r\" (UniqueName: \"kubernetes.io/projected/7614d727-5145-486e-8d21-b867c95fe30e-kube-api-access-lb74r\") pod \"whisker-6c65d694b6-2xhfb\" (UID: \"7614d727-5145-486e-8d21-b867c95fe30e\") " pod="calico-system/whisker-6c65d694b6-2xhfb" May 17 00:34:00.317929 kubelet[1967]: I0517 00:34:00.317804 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/7614d727-5145-486e-8d21-b867c95fe30e-whisker-backend-key-pair\") pod \"whisker-6c65d694b6-2xhfb\" (UID: \"7614d727-5145-486e-8d21-b867c95fe30e\") " pod="calico-system/whisker-6c65d694b6-2xhfb" May 17 00:34:00.317929 kubelet[1967]: I0517 00:34:00.317853 1967 reconciler_common.go:251] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7614d727-5145-486e-8d21-b867c95fe30e-whisker-ca-bundle\") pod \"whisker-6c65d694b6-2xhfb\" (UID: \"7614d727-5145-486e-8d21-b867c95fe30e\") " pod="calico-system/whisker-6c65d694b6-2xhfb" May 17 00:34:00.344000 audit[3535]: AVC avc: denied { write } for pid=3535 comm="tee" name="fd" dev="proc" ino=26837 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:34:00.347000 audit[3531]: AVC avc: denied { write } for pid=3531 comm="tee" name="fd" dev="proc" ino=26840 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:34:00.348000 audit[3542]: AVC avc: denied { write } for pid=3542 comm="tee" name="fd" dev="proc" ino=26843 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:34:00.344000 audit[3535]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce32987e2 a2=241 a3=1b6 items=1 ppid=3501 pid=3535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.344000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:34:00.344000 audit: PATH item=0 name="/dev/fd/63" inode=24264 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:00.344000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:34:00.348000 audit[3542]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc33ccd7d1 a2=241 a3=1b6 items=1 ppid=3497 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.348000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:34:00.348000 audit: PATH item=0 name="/dev/fd/63" inode=26833 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:00.348000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:34:00.347000 audit[3531]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd928d77e1 a2=241 a3=1b6 items=1 ppid=3514 pid=3531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.347000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:34:00.347000 audit: PATH item=0 name="/dev/fd/63" inode=25016 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:00.347000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:34:00.352000 audit[3558]: AVC avc: denied { write } for pid=3558 comm="tee" name="fd" dev="proc" ino=25991 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:34:00.352000 audit[3558]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc3ca1a7e1 a2=241 a3=1b6 items=1 ppid=3496 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.352000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:34:00.352000 audit: PATH item=0 name="/dev/fd/63" inode=25985 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:00.352000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:34:00.358000 audit[3561]: AVC avc: denied { write } for pid=3561 comm="tee" name="fd" dev="proc" ino=26852 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:34:00.361000 audit[3573]: AVC avc: denied { write } for pid=3573 comm="tee" name="fd" dev="proc" ino=25995 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:34:00.358000 audit[3561]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb06de7d2 a2=241 a3=1b6 items=1 ppid=3508 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.358000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:34:00.358000 audit: PATH item=0 name="/dev/fd/63" inode=24266 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:00.358000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:34:00.361000 audit[3573]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc774ea7e3 a2=241 a3=1b6 items=1 ppid=3495 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.361000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:34:00.361000 audit: PATH item=0 name="/dev/fd/63" inode=26846 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:00.361000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:34:00.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.373000 audit: BPF prog-id=140 op=LOAD May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3426 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263336536653433326238363637376235326666633264393035363632 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3426 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263336536653433326238363637376235326666633264393035363632 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit: BPF prog-id=141 op=LOAD May 17 00:34:00.374000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d8210 items=0 ppid=3426 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263336536653433326238363637376235326666633264393035363632 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit: BPF prog-id=142 op=LOAD May 17 00:34:00.374000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d8258 items=0 ppid=3426 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263336536653433326238363637376235326666633264393035363632 May 17 00:34:00.374000 audit: BPF prog-id=142 op=UNLOAD May 17 00:34:00.374000 audit: BPF prog-id=141 op=UNLOAD May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { perfmon } for pid=3468 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit[3468]: AVC avc: denied { bpf } for pid=3468 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.374000 audit: BPF prog-id=143 op=LOAD May 17 00:34:00.374000 audit[3468]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d8668 items=0 ppid=3426 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263336536653433326238363637376235326666633264393035363632 May 17 00:34:00.389000 audit[3576]: AVC avc: denied { write } for pid=3576 comm="tee" name="fd" dev="proc" ino=26002 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:34:00.389000 audit[3576]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe237397e1 a2=241 a3=1b6 items=1 ppid=3503 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.389000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:34:00.389000 audit: PATH item=0 name="/dev/fd/63" inode=25998 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:34:00.389000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:34:00.686136 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3285552813.mount: Deactivated successfully. May 17 00:34:00.889817 env[1214]: time="2025-05-17T00:34:00.889777021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c65d694b6-2xhfb,Uid:7614d727-5145-486e-8d21-b867c95fe30e,Namespace:calico-system,Attempt:0,}" May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit: BPF prog-id=144 op=LOAD May 17 00:34:00.924000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdfd955b00 a2=98 a3=3 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:00.924000 audit: BPF prog-id=144 op=UNLOAD May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit: BPF prog-id=145 op=LOAD May 17 00:34:00.924000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfd9558f0 a2=94 a3=54428f items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:00.924000 audit: BPF prog-id=145 op=UNLOAD May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.924000 audit: BPF prog-id=146 op=LOAD May 17 00:34:00.924000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfd955920 a2=94 a3=2 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.924000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:00.924000 audit: BPF prog-id=146 op=UNLOAD May 17 00:34:01.028000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit: BPF prog-id=147 op=LOAD May 17 00:34:01.028000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffdfd9557e0 a2=94 a3=1 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.028000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.028000 audit: BPF prog-id=147 op=UNLOAD May 17 00:34:01.028000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.028000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffdfd9558b0 a2=50 a3=7ffdfd955990 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.028000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfd9557f0 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfd955820 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfd955730 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfd955840 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfd955820 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfd955810 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfd955840 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfd955820 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfd955840 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdfd955810 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffdfd955880 a2=28 a3=0 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfd955630 a2=50 a3=1 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit: BPF prog-id=148 op=LOAD May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdfd955630 a2=94 a3=5 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit: BPF prog-id=148 op=UNLOAD May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffdfd9556e0 a2=50 a3=1 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffdfd955800 a2=4 a3=38 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.037000 audit[3622]: AVC avc: denied { confidentiality } for pid=3622 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:01.037000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfd955850 a2=94 a3=6 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.037000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { confidentiality } for pid=3622 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:01.038000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfd955000 a2=94 a3=88 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.038000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { perfmon } for pid=3622 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { bpf } for pid=3622 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.038000 audit[3622]: AVC avc: denied { confidentiality } for pid=3622 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:01.038000 audit[3622]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffdfd955000 a2=94 a3=88 items=0 ppid=3499 pid=3622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.038000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:01.044000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.044000 audit: BPF prog-id=149 op=LOAD May 17 00:34:01.044000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd4ba07b0 a2=98 a3=1999999999999999 items=0 ppid=3499 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.044000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:34:01.045000 audit: BPF prog-id=149 op=UNLOAD May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit: BPF prog-id=150 op=LOAD May 17 00:34:01.045000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd4ba0690 a2=94 a3=ffff items=0 ppid=3499 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.045000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:34:01.045000 audit: BPF prog-id=150 op=UNLOAD May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { perfmon } for pid=3625 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit[3625]: AVC avc: denied { bpf } for pid=3625 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.045000 audit: BPF prog-id=151 op=LOAD May 17 00:34:01.045000 audit[3625]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd4ba06d0 a2=94 a3=7fffd4ba08b0 items=0 ppid=3499 pid=3625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.045000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:34:01.045000 audit: BPF prog-id=151 op=UNLOAD May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit: BPF prog-id=152 op=LOAD May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd98679070 a2=98 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit: BPF prog-id=152 op=UNLOAD May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit: BPF prog-id=153 op=LOAD May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd98678e80 a2=94 a3=54428f items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit: BPF prog-id=153 op=UNLOAD May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit: BPF prog-id=154 op=LOAD May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd98678eb0 a2=94 a3=2 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit: BPF prog-id=154 op=UNLOAD May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd98678d80 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd98678db0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd98678cc0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd98678dd0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd98678db0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd98678da0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd98678dd0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd98678db0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd98678dd0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd98678da0 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffd98678e10 a2=28 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.111000 audit: BPF prog-id=155 op=LOAD May 17 00:34:01.111000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd98678c80 a2=94 a3=0 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.111000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.111000 audit: BPF prog-id=155 op=UNLOAD May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd98678c70 a2=50 a3=2800 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffd98678c70 a2=50 a3=2800 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit: BPF prog-id=156 op=LOAD May 17 00:34:01.112000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd98678490 a2=94 a3=2 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.112000 audit: BPF prog-id=156 op=UNLOAD May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { perfmon } for pid=3651 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit[3651]: AVC avc: denied { bpf } for pid=3651 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.112000 audit: BPF prog-id=157 op=LOAD May 17 00:34:01.112000 audit[3651]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd98678590 a2=94 a3=30 items=0 ppid=3499 pid=3651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.112000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit: BPF prog-id=158 op=LOAD May 17 00:34:01.114000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffce3942b0 a2=98 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.114000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.114000 audit: BPF prog-id=158 op=UNLOAD May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit: BPF prog-id=159 op=LOAD May 17 00:34:01.114000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffce3940a0 a2=94 a3=54428f items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.114000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.114000 audit: BPF prog-id=159 op=UNLOAD May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.114000 audit: BPF prog-id=160 op=LOAD May 17 00:34:01.114000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffce3940d0 a2=94 a3=2 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.114000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.114000 audit: BPF prog-id=160 op=UNLOAD May 17 00:34:01.100892 systemd-networkd[1029]: vxlan.calico: Link UP May 17 00:34:01.100897 systemd-networkd[1029]: vxlan.calico: Gained carrier May 17 00:34:01.220000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit: BPF prog-id=161 op=LOAD May 17 00:34:01.220000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffce393f90 a2=94 a3=1 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.220000 audit: BPF prog-id=161 op=UNLOAD May 17 00:34:01.220000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.220000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffce394060 a2=50 a3=7fffce394140 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.220000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffce393fa0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffce393fd0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffce393ee0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffce393ff0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffce393fd0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffce393fc0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffce393ff0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffce393fd0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffce393ff0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffce393fc0 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffce394030 a2=28 a3=0 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffce393de0 a2=50 a3=1 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit: BPF prog-id=162 op=LOAD May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffce393de0 a2=94 a3=5 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit: BPF prog-id=162 op=UNLOAD May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffce393e90 a2=50 a3=1 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffce393fb0 a2=4 a3=38 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.228000 audit[3654]: AVC avc: denied { confidentiality } for pid=3654 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:01.228000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffce394000 a2=94 a3=6 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.228000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { confidentiality } for pid=3654 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:01.229000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffce3937b0 a2=94 a3=88 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { perfmon } for pid=3654 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { confidentiality } for pid=3654 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:01.229000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffce3937b0 a2=94 a3=88 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffce3951e0 a2=10 a3=208 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffce395080 a2=10 a3=3 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffce395020 a2=10 a3=3 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.229000 audit[3654]: AVC avc: denied { bpf } for pid=3654 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:01.229000 audit[3654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffce395020 a2=10 a3=7 items=0 ppid=3499 pid=3654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.229000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:01.236000 audit: BPF prog-id=157 op=UNLOAD May 17 00:34:01.273000 audit[3683]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3683 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:01.273000 audit[3683]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffee0753f80 a2=0 a3=7ffee0753f6c items=0 ppid=3499 pid=3683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.273000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:01.281000 audit[3684]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3684 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:01.281000 audit[3684]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffce7eef440 a2=0 a3=7ffce7eef42c items=0 ppid=3499 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.281000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:01.284000 audit[3682]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3682 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:01.284000 audit[3682]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff6a69c270 a2=0 a3=7fff6a69c25c items=0 ppid=3499 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.284000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:01.286000 audit[3686]: NETFILTER_CFG table=filter:104 family=2 entries=73 op=nft_register_chain pid=3686 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:01.286000 audit[3686]: SYSCALL arch=c000003e syscall=46 success=yes exit=38620 a0=3 a1=7ffcdd8b18e0 a2=0 a3=7ffcdd8b18cc items=0 ppid=3499 pid=3686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.286000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:01.322399 env[1214]: time="2025-05-17T00:34:01.322300469Z" level=info msg="StartContainer for \"2c3e6e432b86677b52ffc2d905662039c843000614fea474166a8de5ef9f45da\" returns successfully" May 17 00:34:01.326365 kubelet[1967]: E0517 00:34:01.326336 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:01.393491 systemd-networkd[1029]: cali6b526988fe4: Gained IPv6LL May 17 00:34:01.512040 kubelet[1967]: I0517 00:34:01.511988 1967 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="aec422ae-19e1-4630-8933-7f2a3ed5b7dc" path="/var/lib/kubelet/pods/aec422ae-19e1-4630-8933-7f2a3ed5b7dc/volumes" May 17 00:34:01.512837 env[1214]: time="2025-05-17T00:34:01.512791598Z" level=info msg="StopPodSandbox for \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\"" May 17 00:34:01.513000 env[1214]: time="2025-05-17T00:34:01.512963943Z" level=info msg="StopPodSandbox for \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\"" May 17 00:34:02.275029 kubelet[1967]: I0517 00:34:02.274966 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-dpsr2" podStartSLOduration=38.274948336 podStartE2EDuration="38.274948336s" podCreationTimestamp="2025-05-17 00:33:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:02.273850547 +0000 UTC m=+44.867914735" watchObservedRunningTime="2025-05-17 00:34:02.274948336 +0000 UTC m=+44.869012534" May 17 00:34:02.327137 kubelet[1967]: E0517 00:34:02.327103 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:02.502000 audit[3778]: NETFILTER_CFG table=filter:105 family=2 entries=20 op=nft_register_rule pid=3778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:02.502000 audit[3778]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffd876f3720 a2=0 a3=7ffd876f370c items=0 ppid=2086 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:02.510294 env[1214]: time="2025-05-17T00:34:02.510231285Z" level=info msg="StopPodSandbox for \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\"" May 17 00:34:02.510735 env[1214]: time="2025-05-17T00:34:02.510439079Z" level=info msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\"" May 17 00:34:02.517000 audit[3778]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3778 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:02.517000 audit[3778]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd876f3720 a2=0 a3=0 items=0 ppid=2086 pid=3778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.517000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.272 [INFO][3745] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.272 [INFO][3745] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" iface="eth0" netns="/var/run/netns/cni-72dfab78-ba66-a387-b94e-e9b9bda86a50" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.272 [INFO][3745] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" iface="eth0" netns="/var/run/netns/cni-72dfab78-ba66-a387-b94e-e9b9bda86a50" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.273 [INFO][3745] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" iface="eth0" netns="/var/run/netns/cni-72dfab78-ba66-a387-b94e-e9b9bda86a50" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.273 [INFO][3745] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.273 [INFO][3745] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.340 [INFO][3762] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.340 [INFO][3762] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.340 [INFO][3762] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.497 [WARNING][3762] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.498 [INFO][3762] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.537 [INFO][3762] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:02.543469 env[1214]: 2025-05-17 00:34:02.540 [INFO][3745] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:02.546732 env[1214]: time="2025-05-17T00:34:02.543655672Z" level=info msg="TearDown network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\" successfully" May 17 00:34:02.546732 env[1214]: time="2025-05-17T00:34:02.543696403Z" level=info msg="StopPodSandbox for \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\" returns successfully" May 17 00:34:02.546732 env[1214]: time="2025-05-17T00:34:02.544323073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-hhlmn,Uid:880e53bc-71af-47ea-ad2d-ce9dfe939fad,Namespace:calico-apiserver,Attempt:1,}" May 17 00:34:02.545882 systemd[1]: run-netns-cni\x2d72dfab78\x2dba66\x2da387\x2db94e\x2de9b9bda86a50.mount: Deactivated successfully. May 17 00:34:02.546229 systemd-networkd[1029]: vxlan.calico: Gained IPv6LL May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.493 [INFO][3746] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.495 [INFO][3746] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" iface="eth0" netns="/var/run/netns/cni-8bbf27b8-b144-2c53-5c04-7e6cfa98dfb8" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.495 [INFO][3746] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" iface="eth0" netns="/var/run/netns/cni-8bbf27b8-b144-2c53-5c04-7e6cfa98dfb8" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.495 [INFO][3746] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" iface="eth0" netns="/var/run/netns/cni-8bbf27b8-b144-2c53-5c04-7e6cfa98dfb8" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.495 [INFO][3746] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.495 [INFO][3746] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.532 [INFO][3772] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.534 [INFO][3772] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.537 [INFO][3772] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.575 [WARNING][3772] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.575 [INFO][3772] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.583 [INFO][3772] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:02.586966 env[1214]: 2025-05-17 00:34:02.585 [INFO][3746] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:02.589309 env[1214]: time="2025-05-17T00:34:02.587105564Z" level=info msg="TearDown network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\" successfully" May 17 00:34:02.589309 env[1214]: time="2025-05-17T00:34:02.587145103Z" level=info msg="StopPodSandbox for \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\" returns successfully" May 17 00:34:02.589309 env[1214]: time="2025-05-17T00:34:02.587778206Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4d498b95-mp7lh,Uid:7a8e0eef-ddac-4da9-91c0-25695122d2d3,Namespace:calico-system,Attempt:1,}" May 17 00:34:02.589379 systemd[1]: run-netns-cni\x2d8bbf27b8\x2db144\x2d2c53\x2d5c04\x2d7e6cfa98dfb8.mount: Deactivated successfully. May 17 00:34:02.653000 audit[3481]: AVC avc: denied { getattr } for pid=3481 comm="coredns" path="cgroup:[4026532471]" dev="nsfs" ino=4026532471 scontext=system_u:system_r:svirt_lxc_net_t:s0:c637,c896 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:34:02.653000 audit[3481]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00024a2d0 a2=c0000af7c8 a3=0 items=0 ppid=3426 pid=3481 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c637,c896 key=(null) May 17 00:34:02.653000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:34:02.745311 systemd-networkd[1029]: calib80aa03e032: Link UP May 17 00:34:02.749345 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:34:02.749433 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib80aa03e032: link becomes ready May 17 00:34:02.749553 systemd-networkd[1029]: calib80aa03e032: Gained carrier May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.627 [INFO][3819] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--6c65d694b6--2xhfb-eth0 whisker-6c65d694b6- calico-system 7614d727-5145-486e-8d21-b867c95fe30e 1073 0 2025-05-17 00:34:00 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:6c65d694b6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-6c65d694b6-2xhfb eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] calib80aa03e032 [] [] }} ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.627 [INFO][3819] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.671 [INFO][3852] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" HandleID="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Workload="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.671 [INFO][3852] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" HandleID="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Workload="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00032ba50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-6c65d694b6-2xhfb", "timestamp":"2025-05-17 00:34:02.671140909 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.671 [INFO][3852] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.671 [INFO][3852] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.671 [INFO][3852] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.691 [INFO][3852] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.704 [INFO][3852] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.711 [INFO][3852] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.712 [INFO][3852] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.714 [INFO][3852] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.714 [INFO][3852] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.718 [INFO][3852] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4 May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.733 [INFO][3852] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.740 [INFO][3852] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.740 [INFO][3852] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" host="localhost" May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.740 [INFO][3852] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:02.772799 env[1214]: 2025-05-17 00:34:02.740 [INFO][3852] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" HandleID="k8s-pod-network.8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Workload="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" May 17 00:34:02.773691 env[1214]: 2025-05-17 00:34:02.742 [INFO][3819] cni-plugin/k8s.go 418: Populated endpoint ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--6c65d694b6--2xhfb-eth0", GenerateName:"whisker-6c65d694b6-", Namespace:"calico-system", SelfLink:"", UID:"7614d727-5145-486e-8d21-b867c95fe30e", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c65d694b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-6c65d694b6-2xhfb", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calib80aa03e032", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:02.773691 env[1214]: 2025-05-17 00:34:02.743 [INFO][3819] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" May 17 00:34:02.773691 env[1214]: 2025-05-17 00:34:02.743 [INFO][3819] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib80aa03e032 ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" May 17 00:34:02.773691 env[1214]: 2025-05-17 00:34:02.750 [INFO][3819] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" May 17 00:34:02.773691 env[1214]: 2025-05-17 00:34:02.755 [INFO][3819] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--6c65d694b6--2xhfb-eth0", GenerateName:"whisker-6c65d694b6-", Namespace:"calico-system", SelfLink:"", UID:"7614d727-5145-486e-8d21-b867c95fe30e", ResourceVersion:"1073", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 34, 0, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"6c65d694b6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4", Pod:"whisker-6c65d694b6-2xhfb", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"calib80aa03e032", MAC:"7e:1c:8a:6d:e0:b2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:02.773691 env[1214]: 2025-05-17 00:34:02.768 [INFO][3819] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4" Namespace="calico-system" Pod="whisker-6c65d694b6-2xhfb" WorkloadEndpoint="localhost-k8s-whisker--6c65d694b6--2xhfb-eth0" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.623 [INFO][3797] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.623 [INFO][3797] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" iface="eth0" netns="/var/run/netns/cni-66f0fd96-2de1-91b4-156c-c611022b6e51" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.623 [INFO][3797] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" iface="eth0" netns="/var/run/netns/cni-66f0fd96-2de1-91b4-156c-c611022b6e51" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.623 [INFO][3797] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" iface="eth0" netns="/var/run/netns/cni-66f0fd96-2de1-91b4-156c-c611022b6e51" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.623 [INFO][3797] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.623 [INFO][3797] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.673 [INFO][3837] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.673 [INFO][3837] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.744 [INFO][3837] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.752 [WARNING][3837] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.752 [INFO][3837] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.753 [INFO][3837] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:02.774522 env[1214]: 2025-05-17 00:34:02.764 [INFO][3797] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:02.776719 env[1214]: time="2025-05-17T00:34:02.776664868Z" level=info msg="TearDown network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" successfully" May 17 00:34:02.776843 env[1214]: time="2025-05-17T00:34:02.776819246Z" level=info msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" returns successfully" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.624 [INFO][3808] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.624 [INFO][3808] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" iface="eth0" netns="/var/run/netns/cni-2a8c8fee-d793-e825-3506-f6179a426f09" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.624 [INFO][3808] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" iface="eth0" netns="/var/run/netns/cni-2a8c8fee-d793-e825-3506-f6179a426f09" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.624 [INFO][3808] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" iface="eth0" netns="/var/run/netns/cni-2a8c8fee-d793-e825-3506-f6179a426f09" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.624 [INFO][3808] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.624 [INFO][3808] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.675 [INFO][3838] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.675 [INFO][3838] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.753 [INFO][3838] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.769 [WARNING][3838] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.769 [INFO][3838] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.771 [INFO][3838] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:02.777295 env[1214]: 2025-05-17 00:34:02.775 [INFO][3808] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:02.777851 env[1214]: time="2025-05-17T00:34:02.777596866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-qdn5m,Uid:5853ea90-86a9-4202-bfdd-da96ffcf909f,Namespace:calico-apiserver,Attempt:1,}" May 17 00:34:02.778283 env[1214]: time="2025-05-17T00:34:02.777822146Z" level=info msg="TearDown network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\" successfully" May 17 00:34:02.778415 env[1214]: time="2025-05-17T00:34:02.778396049Z" level=info msg="StopPodSandbox for \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\" returns successfully" May 17 00:34:02.778864 env[1214]: time="2025-05-17T00:34:02.778842319Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b44b7576b-gz6w9,Uid:157d8a8b-b79c-4a8c-936e-7a1b77262093,Namespace:calico-apiserver,Attempt:1,}" May 17 00:34:02.787000 audit[3922]: NETFILTER_CFG table=filter:107 family=2 entries=63 op=nft_register_chain pid=3922 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:02.787000 audit[3922]: SYSCALL arch=c000003e syscall=46 success=yes exit=37048 a0=3 a1=7fff0727fa90 a2=0 a3=7fff0727fa7c items=0 ppid=3499 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.787000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:02.812690 env[1214]: time="2025-05-17T00:34:02.812484360Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:02.812690 env[1214]: time="2025-05-17T00:34:02.812625481Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:02.812882 env[1214]: time="2025-05-17T00:34:02.812681523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:02.814115 env[1214]: time="2025-05-17T00:34:02.814055202Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4 pid=3933 runtime=io.containerd.runc.v2 May 17 00:34:02.831128 systemd[1]: Started cri-containerd-8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4.scope. May 17 00:34:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.862000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.863000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.863000 audit: BPF prog-id=163 op=LOAD May 17 00:34:02.866204 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60134facb12: link becomes ready May 17 00:34:02.866443 systemd-networkd[1029]: cali60134facb12: Link UP May 17 00:34:02.867202 systemd-networkd[1029]: cali60134facb12: Gained carrier May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3933 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323865633637333361666163653432356262633061623131376434 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3933 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323865633637333361666163653432356262633061623131376434 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit: BPF prog-id=164 op=LOAD May 17 00:34:02.869000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00033d040 items=0 ppid=3933 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323865633637333361666163653432356262633061623131376434 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit: BPF prog-id=165 op=LOAD May 17 00:34:02.869000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00033d088 items=0 ppid=3933 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323865633637333361666163653432356262633061623131376434 May 17 00:34:02.869000 audit: BPF prog-id=165 op=UNLOAD May 17 00:34:02.869000 audit: BPF prog-id=164 op=UNLOAD May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { perfmon } for pid=3943 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit[3943]: AVC avc: denied { bpf } for pid=3943 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.869000 audit: BPF prog-id=166 op=LOAD May 17 00:34:02.869000 audit[3943]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00033d498 items=0 ppid=3933 pid=3943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.869000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835323865633637333361666163653432356262633061623131376434 May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.731 [INFO][3861] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0 calico-apiserver-84df797bd4- calico-apiserver 880e53bc-71af-47ea-ad2d-ce9dfe939fad 1084 0 2025-05-17 00:33:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84df797bd4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-84df797bd4-hhlmn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali60134facb12 [] [] }} ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.736 [INFO][3861] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.789 [INFO][3907] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.789 [INFO][3907] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011f760), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-84df797bd4-hhlmn", "timestamp":"2025-05-17 00:34:02.789379183 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.789 [INFO][3907] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.789 [INFO][3907] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.789 [INFO][3907] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.801 [INFO][3907] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.808 [INFO][3907] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.816 [INFO][3907] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.819 [INFO][3907] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.822 [INFO][3907] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.822 [INFO][3907] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.825 [INFO][3907] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5 May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.832 [INFO][3907] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.839 [INFO][3907] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.839 [INFO][3907] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" host="localhost" May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.839 [INFO][3907] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:02.876945 env[1214]: 2025-05-17 00:34:02.839 [INFO][3907] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.877316 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:02.878222 env[1214]: 2025-05-17 00:34:02.845 [INFO][3861] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0", GenerateName:"calico-apiserver-84df797bd4-", Namespace:"calico-apiserver", SelfLink:"", UID:"880e53bc-71af-47ea-ad2d-ce9dfe939fad", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84df797bd4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-84df797bd4-hhlmn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60134facb12", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:02.878222 env[1214]: 2025-05-17 00:34:02.846 [INFO][3861] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.878222 env[1214]: 2025-05-17 00:34:02.846 [INFO][3861] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali60134facb12 ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.878222 env[1214]: 2025-05-17 00:34:02.863 [INFO][3861] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.878222 env[1214]: 2025-05-17 00:34:02.864 [INFO][3861] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0", GenerateName:"calico-apiserver-84df797bd4-", Namespace:"calico-apiserver", SelfLink:"", UID:"880e53bc-71af-47ea-ad2d-ce9dfe939fad", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84df797bd4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5", Pod:"calico-apiserver-84df797bd4-hhlmn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60134facb12", MAC:"ca:37:15:0a:63:5a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:02.878222 env[1214]: 2025-05-17 00:34:02.874 [INFO][3861] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-hhlmn" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:02.892000 audit[3991]: NETFILTER_CFG table=filter:108 family=2 entries=60 op=nft_register_chain pid=3991 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:02.892000 audit[3991]: SYSCALL arch=c000003e syscall=46 success=yes exit=32248 a0=3 a1=7ffdde3d2cb0 a2=0 a3=7ffdde3d2c9c items=0 ppid=3499 pid=3991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:02.892000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:02.933658 env[1214]: time="2025-05-17T00:34:02.933583808Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6c65d694b6-2xhfb,Uid:7614d727-5145-486e-8d21-b867c95fe30e,Namespace:calico-system,Attempt:0,} returns sandbox id \"8528ec6733aface425bbc0ab117d4fc37d9e7ea53a2bd3c25e0204beaee300d4\"" May 17 00:34:02.935622 env[1214]: time="2025-05-17T00:34:02.935584836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:34:02.978050 env[1214]: time="2025-05-17T00:34:02.977959825Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:02.978050 env[1214]: time="2025-05-17T00:34:02.978003644Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:02.978050 env[1214]: time="2025-05-17T00:34:02.978013724Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:02.978287 env[1214]: time="2025-05-17T00:34:02.978198192Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5 pid=4027 runtime=io.containerd.runc.v2 May 17 00:34:02.988484 systemd[1]: Started cri-containerd-0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5.scope. May 17 00:34:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:02.999000 audit: BPF prog-id=167 op=LOAD May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366261313538326337326263616539306533633837383233386539 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366261313538326337326263616539306533633837383233386539 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit: BPF prog-id=168 op=LOAD May 17 00:34:03.000000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c3dc0 items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366261313538326337326263616539306533633837383233386539 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit: BPF prog-id=169 op=LOAD May 17 00:34:03.000000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c3e08 items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366261313538326337326263616539306533633837383233386539 May 17 00:34:03.000000 audit: BPF prog-id=169 op=UNLOAD May 17 00:34:03.000000 audit: BPF prog-id=168 op=UNLOAD May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.000000 audit: BPF prog-id=170 op=LOAD May 17 00:34:03.000000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000390218 items=0 ppid=4027 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066366261313538326337326263616539306533633837383233386539 May 17 00:34:03.002552 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:03.025402 env[1214]: time="2025-05-17T00:34:03.025350278Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-hhlmn,Uid:880e53bc-71af-47ea-ad2d-ce9dfe939fad,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\"" May 17 00:34:03.116644 systemd-networkd[1029]: calib24270a2677: Link UP May 17 00:34:03.118563 systemd-networkd[1029]: calib24270a2677: Gained carrier May 17 00:34:03.119282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib24270a2677: link becomes ready May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.714 [INFO][3872] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0 calico-kube-controllers-7d4d498b95- calico-system 7a8e0eef-ddac-4da9-91c0-25695122d2d3 1088 0 2025-05-17 00:33:36 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7d4d498b95 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7d4d498b95-mp7lh eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calib24270a2677 [] [] }} ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.714 [INFO][3872] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.801 [INFO][3900] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" HandleID="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.801 [INFO][3900] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" HandleID="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000122e20), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7d4d498b95-mp7lh", "timestamp":"2025-05-17 00:34:02.800963445 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.801 [INFO][3900] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.840 [INFO][3900] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.840 [INFO][3900] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.905 [INFO][3900] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.913 [INFO][3900] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.919 [INFO][3900] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.921 [INFO][3900] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.924 [INFO][3900] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.924 [INFO][3900] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:02.925 [INFO][3900] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6 May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:03.099 [INFO][3900] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:03.111 [INFO][3900] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:03.111 [INFO][3900] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" host="localhost" May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:03.111 [INFO][3900] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:03.143450 env[1214]: 2025-05-17 00:34:03.111 [INFO][3900] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" HandleID="k8s-pod-network.5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:03.144424 env[1214]: 2025-05-17 00:34:03.113 [INFO][3872] cni-plugin/k8s.go 418: Populated endpoint ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0", GenerateName:"calico-kube-controllers-7d4d498b95-", Namespace:"calico-system", SelfLink:"", UID:"7a8e0eef-ddac-4da9-91c0-25695122d2d3", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4d498b95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7d4d498b95-mp7lh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib24270a2677", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:03.144424 env[1214]: 2025-05-17 00:34:03.114 [INFO][3872] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:03.144424 env[1214]: 2025-05-17 00:34:03.114 [INFO][3872] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib24270a2677 ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:03.144424 env[1214]: 2025-05-17 00:34:03.120 [INFO][3872] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:03.144424 env[1214]: 2025-05-17 00:34:03.121 [INFO][3872] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0", GenerateName:"calico-kube-controllers-7d4d498b95-", Namespace:"calico-system", SelfLink:"", UID:"7a8e0eef-ddac-4da9-91c0-25695122d2d3", ResourceVersion:"1088", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4d498b95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6", Pod:"calico-kube-controllers-7d4d498b95-mp7lh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib24270a2677", MAC:"62:77:78:72:73:58", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:03.144424 env[1214]: 2025-05-17 00:34:03.139 [INFO][3872] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6" Namespace="calico-system" Pod="calico-kube-controllers-7d4d498b95-mp7lh" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:03.157000 audit[4070]: NETFILTER_CFG table=filter:109 family=2 entries=46 op=nft_register_chain pid=4070 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:03.157000 audit[4070]: SYSCALL arch=c000003e syscall=46 success=yes exit=23600 a0=3 a1=7ffd2b0e2100 a2=0 a3=7ffd2b0e20ec items=0 ppid=3499 pid=4070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.157000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:03.181700 env[1214]: time="2025-05-17T00:34:03.181498771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:03.181700 env[1214]: time="2025-05-17T00:34:03.181541707Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:03.181700 env[1214]: time="2025-05-17T00:34:03.181555314Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:03.182093 env[1214]: time="2025-05-17T00:34:03.182015530Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6 pid=4078 runtime=io.containerd.runc.v2 May 17 00:34:03.228449 systemd[1]: Started cri-containerd-5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6.scope. May 17 00:34:03.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.248000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.250000 audit: BPF prog-id=171 op=LOAD May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4078 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366632303539313037333035616435663336616464613731376534 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4078 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366632303539313037333035616435663336616464613731376534 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit: BPF prog-id=172 op=LOAD May 17 00:34:03.251000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000282800 items=0 ppid=4078 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366632303539313037333035616435663336616464613731376534 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.251000 audit: BPF prog-id=173 op=LOAD May 17 00:34:03.251000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000282848 items=0 ppid=4078 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.251000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366632303539313037333035616435663336616464613731376534 May 17 00:34:03.256000 audit: BPF prog-id=173 op=UNLOAD May 17 00:34:03.256000 audit: BPF prog-id=172 op=UNLOAD May 17 00:34:03.256000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { perfmon } for pid=4087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.256000 audit[4087]: AVC avc: denied { bpf } for pid=4087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.274919 systemd-networkd[1029]: cali2f5b7d31d61: Link UP May 17 00:34:03.274922 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:03.256000 audit: BPF prog-id=174 op=LOAD May 17 00:34:03.256000 audit[4087]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000282c58 items=0 ppid=4078 pid=4087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564366632303539313037333035616435663336616464613731376534 May 17 00:34:03.278444 systemd-networkd[1029]: cali2f5b7d31d61: Gained carrier May 17 00:34:03.279270 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2f5b7d31d61: link becomes ready May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:02.897 [INFO][3966] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0 calico-apiserver-7b44b7576b- calico-apiserver 157d8a8b-b79c-4a8c-936e-7a1b77262093 1098 0 2025-05-17 00:33:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7b44b7576b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7b44b7576b-gz6w9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2f5b7d31d61 [] [] }} ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:02.897 [INFO][3966] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:02.930 [INFO][3999] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" HandleID="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:02.931 [INFO][3999] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" HandleID="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bd660), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7b44b7576b-gz6w9", "timestamp":"2025-05-17 00:34:02.930880719 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:02.931 [INFO][3999] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.111 [INFO][3999] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.111 [INFO][3999] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.138 [INFO][3999] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.150 [INFO][3999] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.175 [INFO][3999] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.178 [INFO][3999] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.183 [INFO][3999] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.183 [INFO][3999] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.189 [INFO][3999] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5 May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.221 [INFO][3999] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.254 [INFO][3999] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.254 [INFO][3999] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" host="localhost" May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.254 [INFO][3999] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:03.339529 env[1214]: 2025-05-17 00:34:03.254 [INFO][3999] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" HandleID="k8s-pod-network.61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:03.340637 env[1214]: 2025-05-17 00:34:03.261 [INFO][3966] cni-plugin/k8s.go 418: Populated endpoint ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0", GenerateName:"calico-apiserver-7b44b7576b-", Namespace:"calico-apiserver", SelfLink:"", UID:"157d8a8b-b79c-4a8c-936e-7a1b77262093", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b44b7576b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7b44b7576b-gz6w9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2f5b7d31d61", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:03.340637 env[1214]: 2025-05-17 00:34:03.261 [INFO][3966] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:03.340637 env[1214]: 2025-05-17 00:34:03.261 [INFO][3966] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2f5b7d31d61 ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:03.340637 env[1214]: 2025-05-17 00:34:03.279 [INFO][3966] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:03.340637 env[1214]: 2025-05-17 00:34:03.279 [INFO][3966] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0", GenerateName:"calico-apiserver-7b44b7576b-", Namespace:"calico-apiserver", SelfLink:"", UID:"157d8a8b-b79c-4a8c-936e-7a1b77262093", ResourceVersion:"1098", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b44b7576b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5", Pod:"calico-apiserver-7b44b7576b-gz6w9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2f5b7d31d61", MAC:"32:5b:09:f6:d9:db", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:03.340637 env[1214]: 2025-05-17 00:34:03.318 [INFO][3966] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5" Namespace="calico-apiserver" Pod="calico-apiserver-7b44b7576b-gz6w9" WorkloadEndpoint="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:03.354000 audit[4116]: NETFILTER_CFG table=filter:110 family=2 entries=41 op=nft_register_chain pid=4116 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:03.354000 audit[4116]: SYSCALL arch=c000003e syscall=46 success=yes exit=23044 a0=3 a1=7fff048a68b0 a2=0 a3=7fff048a689c items=0 ppid=3499 pid=4116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:03.358651 env[1214]: time="2025-05-17T00:34:03.358595002Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:03.360930 env[1214]: time="2025-05-17T00:34:03.360889953Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7d4d498b95-mp7lh,Uid:7a8e0eef-ddac-4da9-91c0-25695122d2d3,Namespace:calico-system,Attempt:1,} returns sandbox id \"5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6\"" May 17 00:34:03.385482 env[1214]: time="2025-05-17T00:34:03.379055370Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:03.385482 env[1214]: time="2025-05-17T00:34:03.379987586Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:03.385482 env[1214]: time="2025-05-17T00:34:03.380042996Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:03.385482 env[1214]: time="2025-05-17T00:34:03.380058086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:03.385482 env[1214]: time="2025-05-17T00:34:03.380242755Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5 pid=4129 runtime=io.containerd.runc.v2 May 17 00:34:03.385822 kubelet[1967]: E0517 00:34:03.384011 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:03.385822 kubelet[1967]: E0517 00:34:03.384077 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:03.386580 env[1214]: time="2025-05-17T00:34:03.386537170Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:34:03.397395 kubelet[1967]: E0517 00:34:03.397325 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:70e935a2e96d40cfaa78ad64750c7ee6,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-lb74r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6c65d694b6-2xhfb_calico-system(7614d727-5145-486e-8d21-b867c95fe30e): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:03.406122 systemd[1]: Started cri-containerd-61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5.scope. May 17 00:34:03.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.446000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.450000 audit: BPF prog-id=175 op=LOAD May 17 00:34:03.453000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4129 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631373138656238366236346135366665343961316166323436343864 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4129 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631373138656238366236346135366665343961316166323436343864 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.453000 audit: BPF prog-id=176 op=LOAD May 17 00:34:03.453000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002460b0 items=0 ppid=4129 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631373138656238366236346135366665343961316166323436343864 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.456000 audit: BPF prog-id=177 op=LOAD May 17 00:34:03.456000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002460f8 items=0 ppid=4129 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631373138656238366236346135366665343961316166323436343864 May 17 00:34:03.457000 audit: BPF prog-id=177 op=UNLOAD May 17 00:34:03.457000 audit: BPF prog-id=176 op=UNLOAD May 17 00:34:03.457000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { perfmon } for pid=4139 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit[4139]: AVC avc: denied { bpf } for pid=4139 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.457000 audit: BPF prog-id=178 op=LOAD May 17 00:34:03.457000 audit[4139]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000246508 items=0 ppid=4129 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631373138656238366236346135366665343961316166323436343864 May 17 00:34:03.471263 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidffde86fa38: link becomes ready May 17 00:34:03.481954 systemd-networkd[1029]: calidffde86fa38: Link UP May 17 00:34:03.483087 systemd-networkd[1029]: calidffde86fa38: Gained carrier May 17 00:34:03.487082 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:02.897 [INFO][3949] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0 calico-apiserver-84df797bd4- calico-apiserver 5853ea90-86a9-4202-bfdd-da96ffcf909f 1097 0 2025-05-17 00:33:33 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:84df797bd4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-84df797bd4-qdn5m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidffde86fa38 [] [] }} ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:02.898 [INFO][3949] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:02.943 [INFO][4012] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:02.943 [INFO][4012] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001394b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-84df797bd4-qdn5m", "timestamp":"2025-05-17 00:34:02.94342748 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:02.943 [INFO][4012] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.254 [INFO][4012] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.254 [INFO][4012] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.316 [INFO][4012] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.349 [INFO][4012] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.372 [INFO][4012] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.381 [INFO][4012] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.390 [INFO][4012] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.390 [INFO][4012] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.414 [INFO][4012] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.426 [INFO][4012] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.449 [INFO][4012] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.449 [INFO][4012] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" host="localhost" May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.449 [INFO][4012] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:03.537058 env[1214]: 2025-05-17 00:34:03.449 [INFO][4012] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:03.550689 env[1214]: 2025-05-17 00:34:03.455 [INFO][3949] cni-plugin/k8s.go 418: Populated endpoint ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0", GenerateName:"calico-apiserver-84df797bd4-", Namespace:"calico-apiserver", SelfLink:"", UID:"5853ea90-86a9-4202-bfdd-da96ffcf909f", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84df797bd4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-84df797bd4-qdn5m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidffde86fa38", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:03.550689 env[1214]: 2025-05-17 00:34:03.455 [INFO][3949] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:03.550689 env[1214]: 2025-05-17 00:34:03.455 [INFO][3949] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calidffde86fa38 ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:03.550689 env[1214]: 2025-05-17 00:34:03.463 [INFO][3949] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:03.550689 env[1214]: 2025-05-17 00:34:03.476 [INFO][3949] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0", GenerateName:"calico-apiserver-84df797bd4-", Namespace:"calico-apiserver", SelfLink:"", UID:"5853ea90-86a9-4202-bfdd-da96ffcf909f", ResourceVersion:"1097", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84df797bd4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e", Pod:"calico-apiserver-84df797bd4-qdn5m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidffde86fa38", MAC:"ea:54:a8:ae:15:af", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:03.550689 env[1214]: 2025-05-17 00:34:03.505 [INFO][3949] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Namespace="calico-apiserver" Pod="calico-apiserver-84df797bd4-qdn5m" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:03.550689 env[1214]: time="2025-05-17T00:34:03.516508501Z" level=info msg="StopPodSandbox for \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\"" May 17 00:34:03.550689 env[1214]: time="2025-05-17T00:34:03.526799626Z" level=info msg="StopPodSandbox for \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\"" May 17 00:34:03.548149 systemd[1]: run-netns-cni\x2d66f0fd96\x2d2de1\x2d91b4\x2d156c\x2dc611022b6e51.mount: Deactivated successfully. May 17 00:34:03.548507 systemd[1]: run-netns-cni\x2d2a8c8fee\x2dd793\x2de825\x2d3506\x2df6179a426f09.mount: Deactivated successfully. May 17 00:34:03.573000 audit[4199]: NETFILTER_CFG table=filter:111 family=2 entries=45 op=nft_register_chain pid=4199 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:03.573000 audit[4199]: SYSCALL arch=c000003e syscall=46 success=yes exit=24232 a0=3 a1=7ffd18703090 a2=0 a3=7ffd1870307c items=0 ppid=3499 pid=4199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.573000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:03.582827 env[1214]: time="2025-05-17T00:34:03.582775151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7b44b7576b-gz6w9,Uid:157d8a8b-b79c-4a8c-936e-7a1b77262093,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5\"" May 17 00:34:03.599210 env[1214]: time="2025-05-17T00:34:03.590062224Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:03.599210 env[1214]: time="2025-05-17T00:34:03.590146131Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:03.599210 env[1214]: time="2025-05-17T00:34:03.590160900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:03.599210 env[1214]: time="2025-05-17T00:34:03.590473813Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e pid=4210 runtime=io.containerd.runc.v2 May 17 00:34:03.639737 systemd[1]: Started cri-containerd-86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e.scope. May 17 00:34:03.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.655000 audit: BPF prog-id=179 op=LOAD May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4210 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836646133393933653533663366626539666633336638346535623664 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4210 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836646133393933653533663366626539666633336638346535623664 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit: BPF prog-id=180 op=LOAD May 17 00:34:03.656000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000255b0 items=0 ppid=4210 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836646133393933653533663366626539666633336638346535623664 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit: BPF prog-id=181 op=LOAD May 17 00:34:03.656000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000255f8 items=0 ppid=4210 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836646133393933653533663366626539666633336638346535623664 May 17 00:34:03.656000 audit: BPF prog-id=181 op=UNLOAD May 17 00:34:03.656000 audit: BPF prog-id=180 op=UNLOAD May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { perfmon } for pid=4225 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit[4225]: AVC avc: denied { bpf } for pid=4225 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:03.656000 audit: BPF prog-id=182 op=LOAD May 17 00:34:03.656000 audit[4225]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025a08 items=0 ppid=4210 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.656000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836646133393933653533663366626539666633336638346535623664 May 17 00:34:03.659134 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:03.707140 env[1214]: time="2025-05-17T00:34:03.707048014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-84df797bd4-qdn5m,Uid:5853ea90-86a9-4202-bfdd-da96ffcf909f,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\"" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.683 [INFO][4190] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.683 [INFO][4190] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" iface="eth0" netns="/var/run/netns/cni-b6ae1220-c858-9052-98de-889ec685dd5f" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.684 [INFO][4190] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" iface="eth0" netns="/var/run/netns/cni-b6ae1220-c858-9052-98de-889ec685dd5f" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.684 [INFO][4190] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" iface="eth0" netns="/var/run/netns/cni-b6ae1220-c858-9052-98de-889ec685dd5f" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.684 [INFO][4190] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.684 [INFO][4190] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.725 [INFO][4245] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.725 [INFO][4245] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.725 [INFO][4245] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.738 [WARNING][4245] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.738 [INFO][4245] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.743 [INFO][4245] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:03.754924 env[1214]: 2025-05-17 00:34:03.745 [INFO][4190] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:03.756793 env[1214]: time="2025-05-17T00:34:03.756691770Z" level=info msg="TearDown network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\" successfully" May 17 00:34:03.756929 env[1214]: time="2025-05-17T00:34:03.756905796Z" level=info msg="StopPodSandbox for \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\" returns successfully" May 17 00:34:03.761606 kubelet[1967]: E0517 00:34:03.761561 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:03.762543 env[1214]: time="2025-05-17T00:34:03.762480949Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xv8q2,Uid:ed378fdd-93ad-4dac-aafd-61b13548bb53,Namespace:kube-system,Attempt:1,}" May 17 00:34:03.764352 systemd[1]: run-netns-cni\x2db6ae1220\x2dc858\x2d9052\x2d98de\x2d889ec685dd5f.mount: Deactivated successfully. May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.674 [INFO][4203] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.674 [INFO][4203] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" iface="eth0" netns="/var/run/netns/cni-647dd8dc-b488-1b9e-8dfb-b83221b5a45a" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.675 [INFO][4203] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" iface="eth0" netns="/var/run/netns/cni-647dd8dc-b488-1b9e-8dfb-b83221b5a45a" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.675 [INFO][4203] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" iface="eth0" netns="/var/run/netns/cni-647dd8dc-b488-1b9e-8dfb-b83221b5a45a" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.675 [INFO][4203] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.675 [INFO][4203] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.726 [INFO][4246] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.726 [INFO][4246] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.743 [INFO][4246] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.767 [WARNING][4246] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.767 [INFO][4246] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.776 [INFO][4246] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:03.782221 env[1214]: 2025-05-17 00:34:03.779 [INFO][4203] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:03.786204 env[1214]: time="2025-05-17T00:34:03.783127077Z" level=info msg="TearDown network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\" successfully" May 17 00:34:03.786204 env[1214]: time="2025-05-17T00:34:03.783169531Z" level=info msg="StopPodSandbox for \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\" returns successfully" May 17 00:34:03.786204 env[1214]: time="2025-05-17T00:34:03.784033432Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vhb9n,Uid:6355ee6b-a9d4-44f9-9931-2ea96bcf14a7,Namespace:calico-system,Attempt:1,}" May 17 00:34:03.786060 systemd[1]: run-netns-cni\x2d647dd8dc\x2db488\x2d1b9e\x2d8dfb\x2db83221b5a45a.mount: Deactivated successfully. May 17 00:34:03.825512 systemd-networkd[1029]: calib80aa03e032: Gained IPv6LL May 17 00:34:04.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.66:22-10.0.0.1:33802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.081781 kernel: kauditd_printk_skb: 982 callbacks suppressed May 17 00:34:04.081943 kernel: audit: type=1130 audit(1747442044.077:1263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.66:22-10.0.0.1:33802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.078420 systemd[1]: Started sshd@9-10.0.0.66:22-10.0.0.1:33802.service. May 17 00:34:04.160425 systemd-networkd[1029]: cali9b7a3663675: Link UP May 17 00:34:04.176915 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:34:04.177266 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9b7a3663675: link becomes ready May 17 00:34:04.178281 systemd-networkd[1029]: cali9b7a3663675: Gained carrier May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:03.958 [INFO][4266] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0 coredns-674b8bbfcf- kube-system ed378fdd-93ad-4dac-aafd-61b13548bb53 1130 0 2025-05-17 00:33:24 +0000 UTC map[k8s-app:kube-dns pod-template-hash:674b8bbfcf projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-674b8bbfcf-xv8q2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9b7a3663675 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:03.958 [INFO][4266] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.002 [INFO][4293] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" HandleID="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.002 [INFO][4293] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" HandleID="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000351010), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-674b8bbfcf-xv8q2", "timestamp":"2025-05-17 00:34:04.002366084 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.002 [INFO][4293] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.002 [INFO][4293] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.002 [INFO][4293] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.016 [INFO][4293] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.039 [INFO][4293] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.069 [INFO][4293] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.093 [INFO][4293] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.099 [INFO][4293] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.099 [INFO][4293] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.110 [INFO][4293] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851 May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.122 [INFO][4293] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.144 [INFO][4293] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.144 [INFO][4293] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" host="localhost" May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.144 [INFO][4293] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:04.256363 env[1214]: 2025-05-17 00:34:04.144 [INFO][4293] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" HandleID="k8s-pod-network.d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:04.257210 env[1214]: 2025-05-17 00:34:04.152 [INFO][4266] cni-plugin/k8s.go 418: Populated endpoint ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ed378fdd-93ad-4dac-aafd-61b13548bb53", ResourceVersion:"1130", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-674b8bbfcf-xv8q2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9b7a3663675", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:04.257210 env[1214]: 2025-05-17 00:34:04.152 [INFO][4266] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:04.257210 env[1214]: 2025-05-17 00:34:04.152 [INFO][4266] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9b7a3663675 ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:04.257210 env[1214]: 2025-05-17 00:34:04.195 [INFO][4266] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:04.257210 env[1214]: 2025-05-17 00:34:04.196 [INFO][4266] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ed378fdd-93ad-4dac-aafd-61b13548bb53", ResourceVersion:"1130", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851", Pod:"coredns-674b8bbfcf-xv8q2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9b7a3663675", MAC:"1a:e4:91:55:59:b6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:04.257210 env[1214]: 2025-05-17 00:34:04.244 [INFO][4266] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851" Namespace="kube-system" Pod="coredns-674b8bbfcf-xv8q2" WorkloadEndpoint="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:04.291000 audit[4311]: USER_ACCT pid=4311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.295811 sshd[4311]: Accepted publickey for core from 10.0.0.1 port 33802 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:04.299291 kernel: audit: type=1101 audit(1747442044.291:1264): pid=4311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.296000 audit[4311]: CRED_ACQ pid=4311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.300678 sshd[4311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:04.311847 kernel: audit: type=1103 audit(1747442044.296:1265): pid=4311 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.311978 kernel: audit: type=1006 audit(1747442044.296:1266): pid=4311 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:34:04.314438 kernel: audit: type=1300 audit(1747442044.296:1266): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdee8fba0 a2=3 a3=0 items=0 ppid=1 pid=4311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.296000 audit[4311]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdee8fba0 a2=3 a3=0 items=0 ppid=1 pid=4311 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.317492 kernel: audit: type=1327 audit(1747442044.296:1266): proctitle=737368643A20636F7265205B707269765D May 17 00:34:04.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:04.322905 kernel: audit: type=1325 audit(1747442044.307:1267): table=filter:112 family=2 entries=44 op=nft_register_chain pid=4323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:04.307000 audit[4323]: NETFILTER_CFG table=filter:112 family=2 entries=44 op=nft_register_chain pid=4323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:04.323074 systemd[1]: Started session-10.scope. May 17 00:34:04.307000 audit[4323]: SYSCALL arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7fff30664ba0 a2=0 a3=7fff30664b8c items=0 ppid=3499 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.323653 systemd-logind[1203]: New session 10 of user core. May 17 00:34:04.341056 kernel: audit: type=1300 audit(1747442044.307:1267): arch=c000003e syscall=46 success=yes exit=21500 a0=3 a1=7fff30664ba0 a2=0 a3=7fff30664b8c items=0 ppid=3499 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.341225 kernel: audit: type=1327 audit(1747442044.307:1267): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:04.307000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:04.346313 env[1214]: time="2025-05-17T00:34:04.346104676Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:04.346313 env[1214]: time="2025-05-17T00:34:04.346205628Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:04.346555 env[1214]: time="2025-05-17T00:34:04.346221900Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:04.346555 env[1214]: time="2025-05-17T00:34:04.346455444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851 pid=4332 runtime=io.containerd.runc.v2 May 17 00:34:04.352000 audit[4311]: USER_START pid=4311 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.357000 audit[4342]: CRED_ACQ pid=4342 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.361372 kernel: audit: type=1105 audit(1747442044.352:1268): pid=4311 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.376951 systemd[1]: Started cri-containerd-d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851.scope. May 17 00:34:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.396000 audit: BPF prog-id=183 op=LOAD May 17 00:34:04.397000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.397000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4332 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333632656161613665613737643364633365653731653263323436 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4332 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333632656161613665613737643364633365653731653263323436 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.400603 systemd-networkd[1029]: cali703a656194c: Link UP May 17 00:34:04.398000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.398000 audit: BPF prog-id=184 op=LOAD May 17 00:34:04.398000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8490 items=0 ppid=4332 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333632656161613665613737643364633365653731653263323436 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.402000 audit: BPF prog-id=185 op=LOAD May 17 00:34:04.402000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c84d8 items=0 ppid=4332 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333632656161613665613737643364633365653731653263323436 May 17 00:34:04.403000 audit: BPF prog-id=185 op=UNLOAD May 17 00:34:04.403000 audit: BPF prog-id=184 op=UNLOAD May 17 00:34:04.403000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { perfmon } for pid=4341 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.409461 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali703a656194c: link becomes ready May 17 00:34:04.405358 systemd-networkd[1029]: cali703a656194c: Gained carrier May 17 00:34:04.403000 audit[4341]: AVC avc: denied { bpf } for pid=4341 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.403000 audit: BPF prog-id=186 op=LOAD May 17 00:34:04.403000 audit[4341]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c88e8 items=0 ppid=4332 pid=4341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431333632656161613665613737643364633365653731653263323436 May 17 00:34:04.418937 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:03.960 [INFO][4276] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0 goldmane-78d55f7ddc- calico-system 6355ee6b-a9d4-44f9-9931-2ea96bcf14a7 1129 0 2025-05-17 00:33:35 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:78d55f7ddc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-78d55f7ddc-vhb9n eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali703a656194c [] [] }} ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:03.960 [INFO][4276] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.007 [INFO][4300] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" HandleID="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.008 [INFO][4300] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" HandleID="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003254c0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-78d55f7ddc-vhb9n", "timestamp":"2025-05-17 00:34:04.007869555 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.008 [INFO][4300] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.149 [INFO][4300] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.154 [INFO][4300] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.199 [INFO][4300] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.254 [INFO][4300] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.329 [INFO][4300] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.340 [INFO][4300] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.347 [INFO][4300] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.347 [INFO][4300] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.353 [INFO][4300] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555 May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.364 [INFO][4300] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.392 [INFO][4300] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.392 [INFO][4300] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" host="localhost" May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.392 [INFO][4300] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:04.450318 env[1214]: 2025-05-17 00:34:04.392 [INFO][4300] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" HandleID="k8s-pod-network.1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:04.451048 env[1214]: 2025-05-17 00:34:04.398 [INFO][4276] cni-plugin/k8s.go 418: Populated endpoint ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-78d55f7ddc-vhb9n", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali703a656194c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:04.451048 env[1214]: 2025-05-17 00:34:04.398 [INFO][4276] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:04.451048 env[1214]: 2025-05-17 00:34:04.398 [INFO][4276] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali703a656194c ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:04.451048 env[1214]: 2025-05-17 00:34:04.405 [INFO][4276] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:04.451048 env[1214]: 2025-05-17 00:34:04.406 [INFO][4276] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7", ResourceVersion:"1129", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555", Pod:"goldmane-78d55f7ddc-vhb9n", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali703a656194c", MAC:"6a:52:fd:92:e2:09", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:04.451048 env[1214]: 2025-05-17 00:34:04.435 [INFO][4276] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555" Namespace="calico-system" Pod="goldmane-78d55f7ddc-vhb9n" WorkloadEndpoint="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:04.477932 systemd-networkd[1029]: calib24270a2677: Gained IPv6LL May 17 00:34:04.492355 env[1214]: time="2025-05-17T00:34:04.492265714Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-674b8bbfcf-xv8q2,Uid:ed378fdd-93ad-4dac-aafd-61b13548bb53,Namespace:kube-system,Attempt:1,} returns sandbox id \"d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851\"" May 17 00:34:04.493400 kubelet[1967]: E0517 00:34:04.493365 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:04.498741 env[1214]: time="2025-05-17T00:34:04.498696160Z" level=info msg="CreateContainer within sandbox \"d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:34:04.505664 env[1214]: time="2025-05-17T00:34:04.505578455Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:04.505911 env[1214]: time="2025-05-17T00:34:04.505886878Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:04.506002 env[1214]: time="2025-05-17T00:34:04.505979994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:04.506211 env[1214]: time="2025-05-17T00:34:04.506173919Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555 pid=4385 runtime=io.containerd.runc.v2 May 17 00:34:04.536000 audit[4406]: NETFILTER_CFG table=filter:113 family=2 entries=60 op=nft_register_chain pid=4406 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:04.536000 audit[4406]: SYSCALL arch=c000003e syscall=46 success=yes exit=29900 a0=3 a1=7fff6f157c70 a2=0 a3=7fff6f157c5c items=0 ppid=3499 pid=4406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.536000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:04.552031 systemd[1]: Started cri-containerd-1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555.scope. May 17 00:34:04.563523 env[1214]: time="2025-05-17T00:34:04.563451719Z" level=info msg="CreateContainer within sandbox \"d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"77d4ee230ecf02720310c45bbfb461f5b4143f2a295712fa4fc532700193cfc7\"" May 17 00:34:04.564970 env[1214]: time="2025-05-17T00:34:04.564940120Z" level=info msg="StartContainer for \"77d4ee230ecf02720310c45bbfb461f5b4143f2a295712fa4fc532700193cfc7\"" May 17 00:34:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.578000 audit: BPF prog-id=187 op=LOAD May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4385 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161356435396331306233633762316631363065376265643431343833 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4385 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161356435396331306233633762316631363065376265643431343833 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit: BPF prog-id=188 op=LOAD May 17 00:34:04.582000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003a28e0 items=0 ppid=4385 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161356435396331306233633762316631363065376265643431343833 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit: BPF prog-id=189 op=LOAD May 17 00:34:04.582000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003a2928 items=0 ppid=4385 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161356435396331306233633762316631363065376265643431343833 May 17 00:34:04.582000 audit: BPF prog-id=189 op=UNLOAD May 17 00:34:04.582000 audit: BPF prog-id=188 op=UNLOAD May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.582000 audit: BPF prog-id=190 op=LOAD May 17 00:34:04.582000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003a2d38 items=0 ppid=4385 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.582000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161356435396331306233633762316631363065376265643431343833 May 17 00:34:04.591837 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:04.601304 systemd[1]: Started cri-containerd-77d4ee230ecf02720310c45bbfb461f5b4143f2a295712fa4fc532700193cfc7.scope. May 17 00:34:04.617639 sshd[4311]: pam_unix(sshd:session): session closed for user core May 17 00:34:04.619000 audit[4311]: USER_END pid=4311 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.619000 audit[4311]: CRED_DISP pid=4311 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:04.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.66:22-10.0.0.1:33802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:04.621451 systemd[1]: sshd@9-10.0.0.66:22-10.0.0.1:33802.service: Deactivated successfully. May 17 00:34:04.622423 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:34:04.626406 systemd-logind[1203]: Session 10 logged out. Waiting for processes to exit. May 17 00:34:04.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.629000 audit: BPF prog-id=191 op=LOAD May 17 00:34:04.630000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.631361 systemd-logind[1203]: Removed session 10. May 17 00:34:04.630000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4332 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643465653233306563663032373230333130633435626266623436 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4332 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643465653233306563663032373230333130633435626266623436 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.632000 audit: BPF prog-id=192 op=LOAD May 17 00:34:04.632000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000261d40 items=0 ppid=4332 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643465653233306563663032373230333130633435626266623436 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.633000 audit: BPF prog-id=193 op=LOAD May 17 00:34:04.633000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000261d88 items=0 ppid=4332 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643465653233306563663032373230333130633435626266623436 May 17 00:34:04.634000 audit: BPF prog-id=193 op=UNLOAD May 17 00:34:04.634000 audit: BPF prog-id=192 op=UNLOAD May 17 00:34:04.634000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { perfmon } for pid=4427 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit[4427]: AVC avc: denied { bpf } for pid=4427 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.634000 audit: BPF prog-id=194 op=LOAD May 17 00:34:04.634000 audit[4427]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ae198 items=0 ppid=4332 pid=4427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737643465653233306563663032373230333130633435626266623436 May 17 00:34:04.636421 env[1214]: time="2025-05-17T00:34:04.636360912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-78d55f7ddc-vhb9n,Uid:6355ee6b-a9d4-44f9-9931-2ea96bcf14a7,Namespace:calico-system,Attempt:1,} returns sandbox id \"1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555\"" May 17 00:34:04.666000 audit[4438]: AVC avc: denied { getattr } for pid=4438 comm="coredns" path="cgroup:[4026532853]" dev="nsfs" ino=4026532853 scontext=system_u:system_r:svirt_lxc_net_t:s0:c243,c376 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:34:04.666000 audit[4438]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c000166c30 a2=c000545628 a3=0 items=0 ppid=4332 pid=4438 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c243,c376 key=(null) May 17 00:34:04.666000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:34:04.667490 env[1214]: time="2025-05-17T00:34:04.667020288Z" level=info msg="StartContainer for \"77d4ee230ecf02720310c45bbfb461f5b4143f2a295712fa4fc532700193cfc7\" returns successfully" May 17 00:34:04.848957 systemd-networkd[1029]: cali60134facb12: Gained IPv6LL May 17 00:34:05.296374 systemd-networkd[1029]: cali2f5b7d31d61: Gained IPv6LL May 17 00:34:05.353746 kubelet[1967]: E0517 00:34:05.353705 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:05.424382 systemd-networkd[1029]: calidffde86fa38: Gained IPv6LL May 17 00:34:05.510718 env[1214]: time="2025-05-17T00:34:05.510641271Z" level=info msg="StopPodSandbox for \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\"" May 17 00:34:05.570245 kubelet[1967]: I0517 00:34:05.569540 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-674b8bbfcf-xv8q2" podStartSLOduration=41.569523547 podStartE2EDuration="41.569523547s" podCreationTimestamp="2025-05-17 00:33:24 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:05.569265594 +0000 UTC m=+48.163329792" watchObservedRunningTime="2025-05-17 00:34:05.569523547 +0000 UTC m=+48.163587735" May 17 00:34:05.694000 audit[4491]: NETFILTER_CFG table=filter:114 family=2 entries=20 op=nft_register_rule pid=4491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.694000 audit[4491]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc05825ec0 a2=0 a3=7ffc05825eac items=0 ppid=2086 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.694000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.700000 audit[4491]: NETFILTER_CFG table=nat:115 family=2 entries=14 op=nft_register_rule pid=4491 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.700000 audit[4491]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc05825ec0 a2=0 a3=0 items=0 ppid=2086 pid=4491 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.700000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.659 [INFO][4476] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.659 [INFO][4476] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" iface="eth0" netns="/var/run/netns/cni-1da7abf1-4c89-eaa9-89dc-af47214dc7d1" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.660 [INFO][4476] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" iface="eth0" netns="/var/run/netns/cni-1da7abf1-4c89-eaa9-89dc-af47214dc7d1" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.660 [INFO][4476] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" iface="eth0" netns="/var/run/netns/cni-1da7abf1-4c89-eaa9-89dc-af47214dc7d1" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.660 [INFO][4476] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.660 [INFO][4476] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.695 [INFO][4484] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.696 [INFO][4484] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.696 [INFO][4484] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.705 [WARNING][4484] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.705 [INFO][4484] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.708 [INFO][4484] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:05.713017 env[1214]: 2025-05-17 00:34:05.710 [INFO][4476] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:05.714368 env[1214]: time="2025-05-17T00:34:05.714324092Z" level=info msg="TearDown network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\" successfully" May 17 00:34:05.714502 env[1214]: time="2025-05-17T00:34:05.714472246Z" level=info msg="StopPodSandbox for \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\" returns successfully" May 17 00:34:05.715601 env[1214]: time="2025-05-17T00:34:05.715572463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6g96,Uid:34edfeda-9b15-4dd5-8e02-698e32cac2dc,Namespace:calico-system,Attempt:1,}" May 17 00:34:05.717166 systemd[1]: run-netns-cni\x2d1da7abf1\x2d4c89\x2deaa9\x2d89dc\x2daf47214dc7d1.mount: Deactivated successfully. May 17 00:34:05.740000 audit[4495]: NETFILTER_CFG table=filter:116 family=2 entries=17 op=nft_register_rule pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.740000 audit[4495]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff78156f60 a2=0 a3=7fff78156f4c items=0 ppid=2086 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.748000 audit[4495]: NETFILTER_CFG table=nat:117 family=2 entries=35 op=nft_register_chain pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.748000 audit[4495]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff78156f60 a2=0 a3=7fff78156f4c items=0 ppid=2086 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.748000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.875834 systemd-networkd[1029]: calif5603d0ab5b: Link UP May 17 00:34:05.882296 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:34:05.882415 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif5603d0ab5b: link becomes ready May 17 00:34:05.882746 systemd-networkd[1029]: calif5603d0ab5b: Gained carrier May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.801 [INFO][4496] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--t6g96-eth0 csi-node-driver- calico-system 34edfeda-9b15-4dd5-8e02-698e32cac2dc 1155 0 2025-05-17 00:33:36 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:78f6f74485 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-t6g96 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calif5603d0ab5b [] [] }} ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.801 [INFO][4496] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.830 [INFO][4509] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" HandleID="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.830 [INFO][4509] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" HandleID="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00036b990), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-t6g96", "timestamp":"2025-05-17 00:34:05.830107356 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.830 [INFO][4509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.830 [INFO][4509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.830 [INFO][4509] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.839 [INFO][4509] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.843 [INFO][4509] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.848 [INFO][4509] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.849 [INFO][4509] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.851 [INFO][4509] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.851 [INFO][4509] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.853 [INFO][4509] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282 May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.856 [INFO][4509] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.870 [INFO][4509] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.137/26] block=192.168.88.128/26 handle="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.870 [INFO][4509] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.137/26] handle="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" host="localhost" May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.870 [INFO][4509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:05.908015 env[1214]: 2025-05-17 00:34:05.870 [INFO][4509] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.137/26] IPv6=[] ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" HandleID="k8s-pod-network.0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.908635 env[1214]: 2025-05-17 00:34:05.872 [INFO][4496] cni-plugin/k8s.go 418: Populated endpoint ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t6g96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34edfeda-9b15-4dd5-8e02-698e32cac2dc", ResourceVersion:"1155", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-t6g96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif5603d0ab5b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:05.908635 env[1214]: 2025-05-17 00:34:05.872 [INFO][4496] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.137/32] ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.908635 env[1214]: 2025-05-17 00:34:05.872 [INFO][4496] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif5603d0ab5b ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.908635 env[1214]: 2025-05-17 00:34:05.883 [INFO][4496] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.908635 env[1214]: 2025-05-17 00:34:05.883 [INFO][4496] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t6g96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34edfeda-9b15-4dd5-8e02-698e32cac2dc", ResourceVersion:"1155", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282", Pod:"csi-node-driver-t6g96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif5603d0ab5b", MAC:"3e:8a:cf:c3:af:f3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:05.908635 env[1214]: 2025-05-17 00:34:05.898 [INFO][4496] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282" Namespace="calico-system" Pod="csi-node-driver-t6g96" WorkloadEndpoint="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:05.911000 audit[4522]: NETFILTER_CFG table=filter:118 family=2 entries=56 op=nft_register_chain pid=4522 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:05.911000 audit[4522]: SYSCALL arch=c000003e syscall=46 success=yes exit=25484 a0=3 a1=7ffedd37eb30 a2=0 a3=7ffedd37eb1c items=0 ppid=3499 pid=4522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.911000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:05.917142 env[1214]: time="2025-05-17T00:34:05.917069549Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:05.917381 env[1214]: time="2025-05-17T00:34:05.917117824Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:05.917381 env[1214]: time="2025-05-17T00:34:05.917131672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:05.917381 env[1214]: time="2025-05-17T00:34:05.917263184Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282 pid=4535 runtime=io.containerd.runc.v2 May 17 00:34:05.935916 systemd[1]: Started cri-containerd-0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282.scope. May 17 00:34:05.938329 systemd-networkd[1029]: cali703a656194c: Gained IPv6LL May 17 00:34:05.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.952000 audit: BPF prog-id=195 op=LOAD May 17 00:34:05.953000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353033653865663530623833373932326534373364626638313530 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353033653865663530623833373932326534373364626638313530 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.953000 audit: BPF prog-id=196 op=LOAD May 17 00:34:05.953000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000320de0 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353033653865663530623833373932326534373364626638313530 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.955000 audit: BPF prog-id=197 op=LOAD May 17 00:34:05.955000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000320e28 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353033653865663530623833373932326534373364626638313530 May 17 00:34:05.956000 audit: BPF prog-id=197 op=UNLOAD May 17 00:34:05.956000 audit: BPF prog-id=196 op=UNLOAD May 17 00:34:05.956000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { perfmon } for pid=4544 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit[4544]: AVC avc: denied { bpf } for pid=4544 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.956000 audit: BPF prog-id=198 op=LOAD May 17 00:34:05.956000 audit[4544]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000321238 items=0 ppid=4535 pid=4544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.956000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353033653865663530623833373932326534373364626638313530 May 17 00:34:05.959269 systemd-resolved[1149]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:05.976292 env[1214]: time="2025-05-17T00:34:05.976241681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t6g96,Uid:34edfeda-9b15-4dd5-8e02-698e32cac2dc,Namespace:calico-system,Attempt:1,} returns sandbox id \"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282\"" May 17 00:34:06.128497 systemd-networkd[1029]: cali9b7a3663675: Gained IPv6LL May 17 00:34:06.356143 kubelet[1967]: E0517 00:34:06.356105 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:06.522266 systemd[1]: run-containerd-runc-k8s.io-0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282-runc.MFzcwL.mount: Deactivated successfully. May 17 00:34:06.857874 env[1214]: time="2025-05-17T00:34:06.857809880Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:06.860492 env[1214]: time="2025-05-17T00:34:06.860432470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:06.862049 env[1214]: time="2025-05-17T00:34:06.862022629Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:06.863661 env[1214]: time="2025-05-17T00:34:06.863621636Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:06.864145 env[1214]: time="2025-05-17T00:34:06.864110698Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:34:06.865416 env[1214]: time="2025-05-17T00:34:06.865390550Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:34:06.870312 env[1214]: time="2025-05-17T00:34:06.870262329Z" level=info msg="CreateContainer within sandbox \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:34:06.886005 env[1214]: time="2025-05-17T00:34:06.885924083Z" level=info msg="CreateContainer within sandbox \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\"" May 17 00:34:06.886638 env[1214]: time="2025-05-17T00:34:06.886601839Z" level=info msg="StartContainer for \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\"" May 17 00:34:06.906622 systemd[1]: Started cri-containerd-8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f.scope. May 17 00:34:06.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.918000 audit: BPF prog-id=199 op=LOAD May 17 00:34:06.919000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4027 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864306339623331623534343038646333323935616462383230343564 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4027 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864306339623331623534343038646333323935616462383230343564 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.919000 audit: BPF prog-id=200 op=LOAD May 17 00:34:06.919000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a1430 items=0 ppid=4027 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864306339623331623534343038646333323935616462383230343564 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit: BPF prog-id=201 op=LOAD May 17 00:34:06.921000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a1478 items=0 ppid=4027 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864306339623331623534343038646333323935616462383230343564 May 17 00:34:06.921000 audit: BPF prog-id=201 op=UNLOAD May 17 00:34:06.921000 audit: BPF prog-id=200 op=UNLOAD May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { perfmon } for pid=4584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit[4584]: AVC avc: denied { bpf } for pid=4584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.921000 audit: BPF prog-id=202 op=LOAD May 17 00:34:06.921000 audit[4584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a1888 items=0 ppid=4027 pid=4584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864306339623331623534343038646333323935616462383230343564 May 17 00:34:06.951791 env[1214]: time="2025-05-17T00:34:06.951741556Z" level=info msg="StartContainer for \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\" returns successfully" May 17 00:34:07.359102 kubelet[1967]: E0517 00:34:07.358771 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:07.384000 audit[4618]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:07.384000 audit[4618]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff6d20f150 a2=0 a3=7fff6d20f13c items=0 ppid=2086 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.384000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:07.392000 audit[4618]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:07.392000 audit[4618]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff6d20f150 a2=0 a3=7fff6d20f13c items=0 ppid=2086 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:07.729305 systemd-networkd[1029]: calif5603d0ab5b: Gained IPv6LL May 17 00:34:08.072000 audit[4595]: AVC avc: denied { watch } for pid=4595 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_33_48.3233567256/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c519,c548 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c519,c548 tclass=file permissive=0 May 17 00:34:08.072000 audit[4595]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ec1080 a2=fc6 a3=0 items=0 ppid=4027 pid=4595 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c519,c548 key=(null) May 17 00:34:08.072000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:34:08.360725 kubelet[1967]: I0517 00:34:08.360592 1967 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:34:09.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.66:22-10.0.0.1:33818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:09.622893 systemd[1]: Started sshd@10-10.0.0.66:22-10.0.0.1:33818.service. May 17 00:34:09.623961 kernel: kauditd_printk_skb: 319 callbacks suppressed May 17 00:34:09.623999 kernel: audit: type=1130 audit(1747442049.621:1373): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.66:22-10.0.0.1:33818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:09.663000 audit[4621]: USER_ACCT pid=4621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.667000 audit[4621]: CRED_ACQ pid=4621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.669091 sshd[4621]: Accepted publickey for core from 10.0.0.1 port 33818 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:09.669433 kernel: audit: type=1101 audit(1747442049.663:1374): pid=4621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.669466 kernel: audit: type=1103 audit(1747442049.667:1375): pid=4621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.669646 sshd[4621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:09.675233 kernel: audit: type=1006 audit(1747442049.667:1376): pid=4621 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:34:09.674531 systemd[1]: Started session-11.scope. May 17 00:34:09.674855 systemd-logind[1203]: New session 11 of user core. May 17 00:34:09.667000 audit[4621]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc455281c0 a2=3 a3=0 items=0 ppid=1 pid=4621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.682160 kernel: audit: type=1300 audit(1747442049.667:1376): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc455281c0 a2=3 a3=0 items=0 ppid=1 pid=4621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.667000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:09.679000 audit[4621]: USER_START pid=4621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.690443 kernel: audit: type=1327 audit(1747442049.667:1376): proctitle=737368643A20636F7265205B707269765D May 17 00:34:09.690533 kernel: audit: type=1105 audit(1747442049.679:1377): pid=4621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.697127 kernel: audit: type=1103 audit(1747442049.681:1378): pid=4623 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.681000 audit[4623]: CRED_ACQ pid=4623 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.938490 sshd[4621]: pam_unix(sshd:session): session closed for user core May 17 00:34:09.938000 audit[4621]: USER_END pid=4621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.944000 audit[4621]: CRED_DISP pid=4621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.947487 systemd[1]: sshd@10-10.0.0.66:22-10.0.0.1:33818.service: Deactivated successfully. May 17 00:34:09.948419 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:34:09.950428 kernel: audit: type=1106 audit(1747442049.938:1379): pid=4621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.950584 kernel: audit: type=1104 audit(1747442049.944:1380): pid=4621 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.66:22-10.0.0.1:33818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:09.951397 systemd-logind[1203]: Session 11 logged out. Waiting for processes to exit. May 17 00:34:09.953970 systemd-logind[1203]: Removed session 11. May 17 00:34:11.617243 env[1214]: time="2025-05-17T00:34:11.617184246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:11.619952 env[1214]: time="2025-05-17T00:34:11.619914924Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:11.621793 env[1214]: time="2025-05-17T00:34:11.621761421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:11.623426 env[1214]: time="2025-05-17T00:34:11.623401829Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:11.623919 env[1214]: time="2025-05-17T00:34:11.623881649Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:34:11.624927 env[1214]: time="2025-05-17T00:34:11.624891730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:34:11.634730 env[1214]: time="2025-05-17T00:34:11.634682047Z" level=info msg="CreateContainer within sandbox \"5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:34:11.648359 env[1214]: time="2025-05-17T00:34:11.648283832Z" level=info msg="CreateContainer within sandbox \"5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b76a0a53013e423eb20784434d884abd366d7c57af455476d4cd2e0d7d738727\"" May 17 00:34:11.649024 env[1214]: time="2025-05-17T00:34:11.649000741Z" level=info msg="StartContainer for \"b76a0a53013e423eb20784434d884abd366d7c57af455476d4cd2e0d7d738727\"" May 17 00:34:11.662615 systemd[1]: Started cri-containerd-b76a0a53013e423eb20784434d884abd366d7c57af455476d4cd2e0d7d738727.scope. May 17 00:34:11.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.682000 audit: BPF prog-id=203 op=LOAD May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4078 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:11.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237366130613533303133653432336562323037383434333464383834 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4078 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:11.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237366130613533303133653432336562323037383434333464383834 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit: BPF prog-id=204 op=LOAD May 17 00:34:11.683000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002639d0 items=0 ppid=4078 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:11.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237366130613533303133653432336562323037383434333464383834 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit: BPF prog-id=205 op=LOAD May 17 00:34:11.683000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000263a18 items=0 ppid=4078 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:11.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237366130613533303133653432336562323037383434333464383834 May 17 00:34:11.683000 audit: BPF prog-id=205 op=UNLOAD May 17 00:34:11.683000 audit: BPF prog-id=204 op=UNLOAD May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { perfmon } for pid=4645 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit[4645]: AVC avc: denied { bpf } for pid=4645 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:11.683000 audit: BPF prog-id=206 op=LOAD May 17 00:34:11.683000 audit[4645]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000263e28 items=0 ppid=4078 pid=4645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:11.683000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237366130613533303133653432336562323037383434333464383834 May 17 00:34:11.710333 env[1214]: time="2025-05-17T00:34:11.710281504Z" level=info msg="StartContainer for \"b76a0a53013e423eb20784434d884abd366d7c57af455476d4cd2e0d7d738727\" returns successfully" May 17 00:34:11.846407 env[1214]: time="2025-05-17T00:34:11.846301751Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:11.847999 env[1214]: time="2025-05-17T00:34:11.847963251Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:11.848246 kubelet[1967]: E0517 00:34:11.848192 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:11.848761 kubelet[1967]: E0517 00:34:11.848249 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:11.848807 kubelet[1967]: E0517 00:34:11.848483 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-lb74r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6c65d694b6-2xhfb_calico-system(7614d727-5145-486e-8d21-b867c95fe30e): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:11.848930 env[1214]: time="2025-05-17T00:34:11.848849326Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:34:11.850126 kubelet[1967]: E0517 00:34:11.849827 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6c65d694b6-2xhfb" podUID="7614d727-5145-486e-8d21-b867c95fe30e" May 17 00:34:12.328792 kubelet[1967]: E0517 00:34:12.328761 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:12.371716 kubelet[1967]: E0517 00:34:12.371672 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6c65d694b6-2xhfb" podUID="7614d727-5145-486e-8d21-b867c95fe30e" May 17 00:34:12.380927 kubelet[1967]: I0517 00:34:12.380863 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84df797bd4-hhlmn" podStartSLOduration=35.542473225 podStartE2EDuration="39.380845977s" podCreationTimestamp="2025-05-17 00:33:33 +0000 UTC" firstStartedPulling="2025-05-17 00:34:03.02676706 +0000 UTC m=+45.620831248" lastFinishedPulling="2025-05-17 00:34:06.865139812 +0000 UTC m=+49.459204000" observedRunningTime="2025-05-17 00:34:07.370377552 +0000 UTC m=+49.964441740" watchObservedRunningTime="2025-05-17 00:34:12.380845977 +0000 UTC m=+54.974910165" May 17 00:34:12.506486 env[1214]: time="2025-05-17T00:34:12.506419986Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.510393 env[1214]: time="2025-05-17T00:34:12.510351488Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.512011 env[1214]: time="2025-05-17T00:34:12.511982556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.513919 env[1214]: time="2025-05-17T00:34:12.513890673Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.514526 env[1214]: time="2025-05-17T00:34:12.514488195Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:34:12.516539 env[1214]: time="2025-05-17T00:34:12.516249091Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:34:12.515000 audit[4690]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:12.515000 audit[4690]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fffd68e89f0 a2=0 a3=7fffd68e89dc items=0 ppid=2086 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.518437 kubelet[1967]: I0517 00:34:12.518308 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7d4d498b95-mp7lh" podStartSLOduration=28.256198467 podStartE2EDuration="36.518286113s" podCreationTimestamp="2025-05-17 00:33:36 +0000 UTC" firstStartedPulling="2025-05-17 00:34:03.362668424 +0000 UTC m=+45.956732612" lastFinishedPulling="2025-05-17 00:34:11.62475606 +0000 UTC m=+54.218820258" observedRunningTime="2025-05-17 00:34:12.505033142 +0000 UTC m=+55.099097330" watchObservedRunningTime="2025-05-17 00:34:12.518286113 +0000 UTC m=+55.112350301" May 17 00:34:12.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:12.522009 env[1214]: time="2025-05-17T00:34:12.521961667Z" level=info msg="CreateContainer within sandbox \"61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:34:12.529000 audit[4690]: NETFILTER_CFG table=nat:122 family=2 entries=56 op=nft_register_chain pid=4690 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:12.529000 audit[4690]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffd68e89f0 a2=0 a3=7fffd68e89dc items=0 ppid=2086 pid=4690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:12.535671 env[1214]: time="2025-05-17T00:34:12.535630591Z" level=info msg="CreateContainer within sandbox \"61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ef5fe117aea520a99d6457d7f75522f242ca77bb04a097a567f898b2c4456209\"" May 17 00:34:12.536249 env[1214]: time="2025-05-17T00:34:12.536222583Z" level=info msg="StartContainer for \"ef5fe117aea520a99d6457d7f75522f242ca77bb04a097a567f898b2c4456209\"" May 17 00:34:12.550000 audit[4706]: NETFILTER_CFG table=filter:123 family=2 entries=14 op=nft_register_rule pid=4706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:12.550000 audit[4706]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffda74bb950 a2=0 a3=7ffda74bb93c items=0 ppid=2086 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.550000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:12.556625 systemd[1]: Started cri-containerd-ef5fe117aea520a99d6457d7f75522f242ca77bb04a097a567f898b2c4456209.scope. May 17 00:34:12.555000 audit[4706]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4706 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:12.555000 audit[4706]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffda74bb950 a2=0 a3=7ffda74bb93c items=0 ppid=2086 pid=4706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.555000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:12.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit: BPF prog-id=207 op=LOAD May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4129 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356665313137616561353230613939643634353764376637353532 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4129 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356665313137616561353230613939643634353764376637353532 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit: BPF prog-id=208 op=LOAD May 17 00:34:12.571000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002efdc0 items=0 ppid=4129 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356665313137616561353230613939643634353764376637353532 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.571000 audit: BPF prog-id=209 op=LOAD May 17 00:34:12.571000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002efe08 items=0 ppid=4129 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356665313137616561353230613939643634353764376637353532 May 17 00:34:12.572000 audit: BPF prog-id=209 op=UNLOAD May 17 00:34:12.572000 audit: BPF prog-id=208 op=UNLOAD May 17 00:34:12.572000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { perfmon } for pid=4699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit[4699]: AVC avc: denied { bpf } for pid=4699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.572000 audit: BPF prog-id=210 op=LOAD May 17 00:34:12.572000 audit[4699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ce218 items=0 ppid=4129 pid=4699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566356665313137616561353230613939643634353764376637353532 May 17 00:34:12.601113 env[1214]: time="2025-05-17T00:34:12.598449945Z" level=info msg="StartContainer for \"ef5fe117aea520a99d6457d7f75522f242ca77bb04a097a567f898b2c4456209\" returns successfully" May 17 00:34:12.924125 env[1214]: time="2025-05-17T00:34:12.923977308Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.926553 env[1214]: time="2025-05-17T00:34:12.926517225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.928429 env[1214]: time="2025-05-17T00:34:12.928392768Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.930199 env[1214]: time="2025-05-17T00:34:12.930156398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.931240 env[1214]: time="2025-05-17T00:34:12.930805613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:34:12.932415 env[1214]: time="2025-05-17T00:34:12.932248088Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:34:12.939055 env[1214]: time="2025-05-17T00:34:12.938982607Z" level=info msg="CreateContainer within sandbox \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:34:12.960231 env[1214]: time="2025-05-17T00:34:12.960131847Z" level=info msg="CreateContainer within sandbox \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\"" May 17 00:34:12.962273 env[1214]: time="2025-05-17T00:34:12.961091556Z" level=info msg="StartContainer for \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\"" May 17 00:34:13.000511 systemd[1]: Started cri-containerd-c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c.scope. May 17 00:34:13.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.013000 audit: BPF prog-id=211 op=LOAD May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4210 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306233353531306232383363353330373838383064653232346465 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4210 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306233353531306232383363353330373838383064653232346465 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit: BPF prog-id=212 op=LOAD May 17 00:34:13.014000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002841b0 items=0 ppid=4210 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306233353531306232383363353330373838383064653232346465 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit: BPF prog-id=213 op=LOAD May 17 00:34:13.014000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002841f8 items=0 ppid=4210 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306233353531306232383363353330373838383064653232346465 May 17 00:34:13.014000 audit: BPF prog-id=213 op=UNLOAD May 17 00:34:13.014000 audit: BPF prog-id=212 op=UNLOAD May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { perfmon } for pid=4741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit[4741]: AVC avc: denied { bpf } for pid=4741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.014000 audit: BPF prog-id=214 op=LOAD May 17 00:34:13.014000 audit[4741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284608 items=0 ppid=4210 pid=4741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330306233353531306232383363353330373838383064653232346465 May 17 00:34:13.046882 env[1214]: time="2025-05-17T00:34:13.046827512Z" level=info msg="StartContainer for \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\" returns successfully" May 17 00:34:13.208512 env[1214]: time="2025-05-17T00:34:13.208335737Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:13.281980 env[1214]: time="2025-05-17T00:34:13.281894975Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:13.282209 kubelet[1967]: E0517 00:34:13.282150 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:13.282500 kubelet[1967]: E0517 00:34:13.282219 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:13.282500 kubelet[1967]: E0517 00:34:13.282410 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5xqs8,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-vhb9n_calico-system(6355ee6b-a9d4-44f9-9931-2ea96bcf14a7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:13.283032 env[1214]: time="2025-05-17T00:34:13.282980212Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:34:13.284588 kubelet[1967]: E0517 00:34:13.284528 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:34:13.376845 kubelet[1967]: E0517 00:34:13.376802 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:34:13.535253 kubelet[1967]: I0517 00:34:13.535198 1967 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:34:13.617000 audit[4795]: NETFILTER_CFG table=filter:125 family=2 entries=14 op=nft_register_rule pid=4795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:13.617000 audit[4795]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffed386f140 a2=0 a3=7ffed386f12c items=0 ppid=2086 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.617000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:13.622000 audit[4795]: NETFILTER_CFG table=nat:126 family=2 entries=20 op=nft_register_rule pid=4795 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:13.622000 audit[4795]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffed386f140 a2=0 a3=7ffed386f12c items=0 ppid=2086 pid=4795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.622000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:13.632211 systemd[1]: run-containerd-runc-k8s.io-c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c-runc.w0O4XQ.mount: Deactivated successfully. May 17 00:34:13.823102 kubelet[1967]: I0517 00:34:13.822946 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-84df797bd4-qdn5m" podStartSLOduration=31.600764526 podStartE2EDuration="40.822924609s" podCreationTimestamp="2025-05-17 00:33:33 +0000 UTC" firstStartedPulling="2025-05-17 00:34:03.709881787 +0000 UTC m=+46.303945975" lastFinishedPulling="2025-05-17 00:34:12.93204185 +0000 UTC m=+55.526106058" observedRunningTime="2025-05-17 00:34:13.562617295 +0000 UTC m=+56.156681513" watchObservedRunningTime="2025-05-17 00:34:13.822924609 +0000 UTC m=+56.416988807" May 17 00:34:13.849718 kubelet[1967]: I0517 00:34:13.849654 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7b44b7576b-gz6w9" podStartSLOduration=30.917834258 podStartE2EDuration="39.849636823s" podCreationTimestamp="2025-05-17 00:33:34 +0000 UTC" firstStartedPulling="2025-05-17 00:34:03.584098638 +0000 UTC m=+46.178162826" lastFinishedPulling="2025-05-17 00:34:12.515901203 +0000 UTC m=+55.109965391" observedRunningTime="2025-05-17 00:34:13.83472312 +0000 UTC m=+56.428787308" watchObservedRunningTime="2025-05-17 00:34:13.849636823 +0000 UTC m=+56.443701011" May 17 00:34:14.341000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.341000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.341000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c0141af650 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:34:14.341000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=5204 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.341000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:14.341000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c014116090 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:34:14.341000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:14.341000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c014260d40 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:34:14.341000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:14.350000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.350000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c0142613e0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:34:14.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:14.351000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.351000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c013952f30 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:34:14.351000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:14.354000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.354000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c013952fc0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:34:14.354000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:14.561000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.561000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a6e570 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:34:14.561000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:14.561000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:14.561000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002fdebe0 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:34:14.561000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:14.592000 audit[4712]: AVC avc: denied { watch } for pid=4712 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_33_48.2288992769/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c701 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c701 tclass=file permissive=0 May 17 00:34:14.592000 audit[4712]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003ca5c0 a2=fc6 a3=0 items=0 ppid=4129 pid=4712 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c701 key=(null) May 17 00:34:14.592000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:34:14.627751 kernel: kauditd_printk_skb: 217 callbacks suppressed May 17 00:34:14.627920 kernel: audit: type=1325 audit(1747442054.623:1451): table=filter:127 family=2 entries=13 op=nft_register_rule pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.623000 audit[4797]: NETFILTER_CFG table=filter:127 family=2 entries=13 op=nft_register_rule pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.623000 audit[4797]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdcc4b6b60 a2=0 a3=7ffdcc4b6b4c items=0 ppid=2086 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.637769 kernel: audit: type=1300 audit(1747442054.623:1451): arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffdcc4b6b60 a2=0 a3=7ffdcc4b6b4c items=0 ppid=2086 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.637912 kernel: audit: type=1327 audit(1747442054.623:1451): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.623000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.640000 audit[4797]: NETFILTER_CFG table=nat:128 family=2 entries=31 op=nft_register_chain pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.645296 kernel: audit: type=1325 audit(1747442054.640:1452): table=nat:128 family=2 entries=31 op=nft_register_chain pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.640000 audit[4797]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdcc4b6b60 a2=0 a3=7ffdcc4b6b4c items=0 ppid=2086 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.653198 kernel: audit: type=1300 audit(1747442054.640:1452): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffdcc4b6b60 a2=0 a3=7ffdcc4b6b4c items=0 ppid=2086 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.656232 kernel: audit: type=1327 audit(1747442054.640:1452): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.749000 audit[4751]: AVC avc: denied { watch } for pid=4751 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_33_48.4153925252/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c558 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c338,c558 tclass=file permissive=0 May 17 00:34:14.760789 kernel: audit: type=1400 audit(1747442054.749:1453): avc: denied { watch } for pid=4751 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_33_48.4153925252/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c558 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c338,c558 tclass=file permissive=0 May 17 00:34:14.760854 kernel: audit: type=1300 audit(1747442054.749:1453): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b1c000 a2=fc6 a3=0 items=0 ppid=4210 pid=4751 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c558 key=(null) May 17 00:34:14.749000 audit[4751]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b1c000 a2=fc6 a3=0 items=0 ppid=4210 pid=4751 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c558 key=(null) May 17 00:34:14.749000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:34:14.767202 kernel: audit: type=1327 audit(1747442054.749:1453): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:34:14.943441 systemd[1]: Started sshd@11-10.0.0.66:22-10.0.0.1:46032.service. May 17 00:34:14.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.66:22-10.0.0.1:46032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.950217 kernel: audit: type=1130 audit(1747442054.943:1454): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.66:22-10.0.0.1:46032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.985000 audit[4799]: USER_ACCT pid=4799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.986544 sshd[4799]: Accepted publickey for core from 10.0.0.1 port 46032 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:14.987000 audit[4799]: CRED_ACQ pid=4799 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.987000 audit[4799]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd313507d0 a2=3 a3=0 items=0 ppid=1 pid=4799 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.987000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:14.987719 sshd[4799]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:14.991325 systemd-logind[1203]: New session 12 of user core. May 17 00:34:14.992115 systemd[1]: Started session-12.scope. May 17 00:34:14.996000 audit[4799]: USER_START pid=4799 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.997000 audit[4801]: CRED_ACQ pid=4801 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.359028 sshd[4799]: pam_unix(sshd:session): session closed for user core May 17 00:34:15.360000 audit[4799]: USER_END pid=4799 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.360000 audit[4799]: CRED_DISP pid=4799 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.362227 systemd[1]: sshd@11-10.0.0.66:22-10.0.0.1:46032.service: Deactivated successfully. May 17 00:34:15.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.66:22-10.0.0.1:46032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:15.362771 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:34:15.363833 systemd-logind[1203]: Session 12 logged out. Waiting for processes to exit. May 17 00:34:15.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.66:22-10.0.0.1:46040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:15.364863 systemd[1]: Started sshd@12-10.0.0.66:22-10.0.0.1:46040.service. May 17 00:34:15.369669 systemd-logind[1203]: Removed session 12. May 17 00:34:15.399000 audit[4814]: USER_ACCT pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.399513 sshd[4814]: Accepted publickey for core from 10.0.0.1 port 46040 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:15.400000 audit[4814]: CRED_ACQ pid=4814 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.400000 audit[4814]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe785e8340 a2=3 a3=0 items=0 ppid=1 pid=4814 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.400000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:15.400598 sshd[4814]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:15.403714 systemd-logind[1203]: New session 13 of user core. May 17 00:34:15.404464 systemd[1]: Started session-13.scope. May 17 00:34:15.408000 audit[4814]: USER_START pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.409000 audit[4816]: CRED_ACQ pid=4816 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.555899 env[1214]: time="2025-05-17T00:34:15.555834424Z" level=info msg="StopContainer for \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\" with timeout 30 (s)" May 17 00:34:15.556498 env[1214]: time="2025-05-17T00:34:15.556287539Z" level=info msg="Stop container \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\" with signal terminated" May 17 00:34:15.567596 systemd[1]: cri-containerd-c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c.scope: Deactivated successfully. May 17 00:34:15.567000 audit: BPF prog-id=211 op=UNLOAD May 17 00:34:15.571000 audit: BPF prog-id=214 op=UNLOAD May 17 00:34:15.588362 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c-rootfs.mount: Deactivated successfully. May 17 00:34:15.670000 audit[4843]: NETFILTER_CFG table=filter:129 family=2 entries=12 op=nft_register_rule pid=4843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:15.670000 audit[4843]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffe1d4ba740 a2=0 a3=7ffe1d4ba72c items=0 ppid=2086 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:15.677000 audit[4843]: NETFILTER_CFG table=nat:130 family=2 entries=36 op=nft_register_rule pid=4843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:15.677000 audit[4843]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffe1d4ba740 a2=0 a3=7ffe1d4ba72c items=0 ppid=2086 pid=4843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:15.864945 sshd[4814]: pam_unix(sshd:session): session closed for user core May 17 00:34:15.864000 audit[4814]: USER_END pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.864000 audit[4814]: CRED_DISP pid=4814 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.66:22-10.0.0.1:46040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:15.867569 systemd[1]: sshd@12-10.0.0.66:22-10.0.0.1:46040.service: Deactivated successfully. May 17 00:34:15.868100 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:34:15.868573 systemd-logind[1203]: Session 13 logged out. Waiting for processes to exit. May 17 00:34:15.869378 systemd[1]: Started sshd@13-10.0.0.66:22-10.0.0.1:46054.service. May 17 00:34:15.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.66:22-10.0.0.1:46054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:15.870297 systemd-logind[1203]: Removed session 13. May 17 00:34:15.904000 audit[4846]: USER_ACCT pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.905687 sshd[4846]: Accepted publickey for core from 10.0.0.1 port 46054 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:15.905000 audit[4846]: CRED_ACQ pid=4846 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.905000 audit[4846]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd845e4780 a2=3 a3=0 items=0 ppid=1 pid=4846 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.905000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:15.906990 sshd[4846]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:15.910208 systemd-logind[1203]: New session 14 of user core. May 17 00:34:15.911196 systemd[1]: Started session-14.scope. May 17 00:34:15.915000 audit[4846]: USER_START pid=4846 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:15.916000 audit[4848]: CRED_ACQ pid=4848 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:16.279764 env[1214]: time="2025-05-17T00:34:16.279705728Z" level=info msg="shim disconnected" id=c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c May 17 00:34:16.279764 env[1214]: time="2025-05-17T00:34:16.279761429Z" level=warning msg="cleaning up after shim disconnected" id=c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c namespace=k8s.io May 17 00:34:16.279764 env[1214]: time="2025-05-17T00:34:16.279772340Z" level=info msg="cleaning up dead shim" May 17 00:34:16.289365 env[1214]: time="2025-05-17T00:34:16.289295425Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:34:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4859 runtime=io.containerd.runc.v2\n" May 17 00:34:16.450447 sshd[4846]: pam_unix(sshd:session): session closed for user core May 17 00:34:16.450000 audit[4846]: USER_END pid=4846 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:16.450000 audit[4846]: CRED_DISP pid=4846 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:16.452712 systemd[1]: sshd@13-10.0.0.66:22-10.0.0.1:46054.service: Deactivated successfully. May 17 00:34:16.451000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.66:22-10.0.0.1:46054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:16.453455 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:34:16.454235 systemd-logind[1203]: Session 14 logged out. Waiting for processes to exit. May 17 00:34:16.455024 systemd-logind[1203]: Removed session 14. May 17 00:34:16.471144 env[1214]: time="2025-05-17T00:34:16.471045694Z" level=info msg="StopContainer for \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\" returns successfully" May 17 00:34:16.471564 env[1214]: time="2025-05-17T00:34:16.471536985Z" level=info msg="StopPodSandbox for \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\"" May 17 00:34:16.471625 env[1214]: time="2025-05-17T00:34:16.471593367Z" level=info msg="Container to stop \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 17 00:34:16.474750 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e-shm.mount: Deactivated successfully. May 17 00:34:16.481265 systemd[1]: cri-containerd-86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e.scope: Deactivated successfully. May 17 00:34:16.480000 audit: BPF prog-id=179 op=UNLOAD May 17 00:34:16.486000 audit: BPF prog-id=182 op=UNLOAD May 17 00:34:16.488053 env[1214]: time="2025-05-17T00:34:16.487782722Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:16.500967 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e-rootfs.mount: Deactivated successfully. May 17 00:34:16.504899 env[1214]: time="2025-05-17T00:34:16.504761015Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:16.518243 env[1214]: time="2025-05-17T00:34:16.518198484Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:16.521952 env[1214]: time="2025-05-17T00:34:16.521168902Z" level=info msg="shim disconnected" id=86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e May 17 00:34:16.521952 env[1214]: time="2025-05-17T00:34:16.521225995Z" level=warning msg="cleaning up after shim disconnected" id=86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e namespace=k8s.io May 17 00:34:16.521952 env[1214]: time="2025-05-17T00:34:16.521233650Z" level=info msg="cleaning up dead shim" May 17 00:34:16.521952 env[1214]: time="2025-05-17T00:34:16.521366112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:16.521952 env[1214]: time="2025-05-17T00:34:16.521616045Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:34:16.526659 env[1214]: time="2025-05-17T00:34:16.526611805Z" level=info msg="CreateContainer within sandbox \"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:34:16.533502 env[1214]: time="2025-05-17T00:34:16.532744872Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:34:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4891 runtime=io.containerd.runc.v2\n" May 17 00:34:16.544986 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3047302078.mount: Deactivated successfully. May 17 00:34:16.550928 env[1214]: time="2025-05-17T00:34:16.550880783Z" level=info msg="CreateContainer within sandbox \"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f8a5fa996f78b533e7f273f09878aa74d88eef8175c15513548c0f8cfd8135b3\"" May 17 00:34:16.551502 env[1214]: time="2025-05-17T00:34:16.551351413Z" level=info msg="StartContainer for \"f8a5fa996f78b533e7f273f09878aa74d88eef8175c15513548c0f8cfd8135b3\"" May 17 00:34:16.568959 systemd[1]: Started cri-containerd-f8a5fa996f78b533e7f273f09878aa74d88eef8175c15513548c0f8cfd8135b3.scope. May 17 00:34:16.590000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f96185bd4d8 items=0 ppid=4535 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613566613939366637386235333365376632373366303938373861 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.590000 audit: BPF prog-id=215 op=LOAD May 17 00:34:16.590000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000298888 items=0 ppid=4535 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613566613939366637386235333365376632373366303938373861 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit: BPF prog-id=216 op=LOAD May 17 00:34:16.591000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002988d8 items=0 ppid=4535 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613566613939366637386235333365376632373366303938373861 May 17 00:34:16.591000 audit: BPF prog-id=216 op=UNLOAD May 17 00:34:16.591000 audit: BPF prog-id=215 op=UNLOAD May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { perfmon } for pid=4928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit[4928]: AVC avc: denied { bpf } for pid=4928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:16.591000 audit: BPF prog-id=217 op=LOAD May 17 00:34:16.591000 audit[4928]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000298968 items=0 ppid=4535 pid=4928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638613566613939366637386235333365376632373366303938373861 May 17 00:34:16.610745 env[1214]: time="2025-05-17T00:34:16.610677371Z" level=info msg="StartContainer for \"f8a5fa996f78b533e7f273f09878aa74d88eef8175c15513548c0f8cfd8135b3\" returns successfully" May 17 00:34:16.614539 env[1214]: time="2025-05-17T00:34:16.614495515Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:34:16.622671 systemd-networkd[1029]: calidffde86fa38: Link DOWN May 17 00:34:16.622680 systemd-networkd[1029]: calidffde86fa38: Lost carrier May 17 00:34:16.638000 audit[4964]: NETFILTER_CFG table=filter:131 family=2 entries=55 op=nft_register_rule pid=4964 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:16.638000 audit[4964]: SYSCALL arch=c000003e syscall=46 success=yes exit=8928 a0=3 a1=7ffe5d321f60 a2=0 a3=7ffe5d321f4c items=0 ppid=3499 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.638000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:16.639000 audit[4964]: NETFILTER_CFG table=filter:132 family=2 entries=2 op=nft_unregister_chain pid=4964 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:16.639000 audit[4964]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe5d321f60 a2=0 a3=559bb794e000 items=0 ppid=3499 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.639000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.621 [INFO][4916] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.621 [INFO][4916] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" iface="eth0" netns="/var/run/netns/cni-b5697ddd-dce9-9b25-1489-aedc81c96a50" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.622 [INFO][4916] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" iface="eth0" netns="/var/run/netns/cni-b5697ddd-dce9-9b25-1489-aedc81c96a50" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.642 [INFO][4916] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" after=20.654005ms iface="eth0" netns="/var/run/netns/cni-b5697ddd-dce9-9b25-1489-aedc81c96a50" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.642 [INFO][4916] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.642 [INFO][4916] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.665 [INFO][4966] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.666 [INFO][4966] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.666 [INFO][4966] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.697 [INFO][4966] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.697 [INFO][4966] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.698 [INFO][4966] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:16.703215 env[1214]: 2025-05-17 00:34:16.701 [INFO][4916] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:16.704003 env[1214]: time="2025-05-17T00:34:16.703965839Z" level=info msg="TearDown network for sandbox \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" successfully" May 17 00:34:16.704092 env[1214]: time="2025-05-17T00:34:16.704069074Z" level=info msg="StopPodSandbox for \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" returns successfully" May 17 00:34:16.704661 env[1214]: time="2025-05-17T00:34:16.704640783Z" level=info msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\"" May 17 00:34:16.706688 systemd[1]: run-netns-cni\x2db5697ddd\x2ddce9\x2d9b25\x2d1489\x2daedc81c96a50.mount: Deactivated successfully. May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.740 [WARNING][4983] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0", GenerateName:"calico-apiserver-84df797bd4-", Namespace:"calico-apiserver", SelfLink:"", UID:"5853ea90-86a9-4202-bfdd-da96ffcf909f", ResourceVersion:"1314", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84df797bd4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e", Pod:"calico-apiserver-84df797bd4-qdn5m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidffde86fa38", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.740 [INFO][4983] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.740 [INFO][4983] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" iface="eth0" netns="" May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.740 [INFO][4983] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.740 [INFO][4983] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.761 [INFO][4991] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.761 [INFO][4991] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.761 [INFO][4991] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.768 [WARNING][4991] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.769 [INFO][4991] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.770 [INFO][4991] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:16.773663 env[1214]: 2025-05-17 00:34:16.771 [INFO][4983] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:16.774146 env[1214]: time="2025-05-17T00:34:16.773685243Z" level=info msg="TearDown network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" successfully" May 17 00:34:16.774146 env[1214]: time="2025-05-17T00:34:16.773731535Z" level=info msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" returns successfully" May 17 00:34:16.808000 audit[5000]: NETFILTER_CFG table=filter:133 family=2 entries=12 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:16.808000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffeb8b4df80 a2=0 a3=7ffeb8b4df6c items=0 ppid=2086 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:16.813000 audit[5000]: NETFILTER_CFG table=nat:134 family=2 entries=36 op=nft_register_rule pid=5000 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:16.813000 audit[5000]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffeb8b4df80 a2=0 a3=7ffeb8b4df6c items=0 ppid=2086 pid=5000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:16.887116 kubelet[1967]: I0517 00:34:16.887048 1967 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-l52cc\" (UniqueName: \"kubernetes.io/projected/5853ea90-86a9-4202-bfdd-da96ffcf909f-kube-api-access-l52cc\") pod \"5853ea90-86a9-4202-bfdd-da96ffcf909f\" (UID: \"5853ea90-86a9-4202-bfdd-da96ffcf909f\") " May 17 00:34:16.887116 kubelet[1967]: I0517 00:34:16.887107 1967 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5853ea90-86a9-4202-bfdd-da96ffcf909f-calico-apiserver-certs\") pod \"5853ea90-86a9-4202-bfdd-da96ffcf909f\" (UID: \"5853ea90-86a9-4202-bfdd-da96ffcf909f\") " May 17 00:34:16.894363 kubelet[1967]: I0517 00:34:16.893364 1967 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/5853ea90-86a9-4202-bfdd-da96ffcf909f-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "5853ea90-86a9-4202-bfdd-da96ffcf909f" (UID: "5853ea90-86a9-4202-bfdd-da96ffcf909f"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:34:16.894595 systemd[1]: var-lib-kubelet-pods-5853ea90\x2d86a9\x2d4202\x2dbfdd\x2dda96ffcf909f-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dl52cc.mount: Deactivated successfully. May 17 00:34:16.894707 systemd[1]: var-lib-kubelet-pods-5853ea90\x2d86a9\x2d4202\x2dbfdd\x2dda96ffcf909f-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 17 00:34:16.899067 kubelet[1967]: I0517 00:34:16.899023 1967 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/5853ea90-86a9-4202-bfdd-da96ffcf909f-kube-api-access-l52cc" (OuterVolumeSpecName: "kube-api-access-l52cc") pod "5853ea90-86a9-4202-bfdd-da96ffcf909f" (UID: "5853ea90-86a9-4202-bfdd-da96ffcf909f"). InnerVolumeSpecName "kube-api-access-l52cc". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:34:16.988942 kubelet[1967]: I0517 00:34:16.988884 1967 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-l52cc\" (UniqueName: \"kubernetes.io/projected/5853ea90-86a9-4202-bfdd-da96ffcf909f-kube-api-access-l52cc\") on node \"localhost\" DevicePath \"\"" May 17 00:34:16.988942 kubelet[1967]: I0517 00:34:16.988919 1967 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5853ea90-86a9-4202-bfdd-da96ffcf909f-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 17 00:34:17.477381 kubelet[1967]: I0517 00:34:17.477351 1967 scope.go:117] "RemoveContainer" containerID="c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c" May 17 00:34:17.478542 env[1214]: time="2025-05-17T00:34:17.478488016Z" level=info msg="RemoveContainer for \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\"" May 17 00:34:17.483434 systemd[1]: Removed slice kubepods-besteffort-pod5853ea90_86a9_4202_bfdd_da96ffcf909f.slice. May 17 00:34:17.485379 env[1214]: time="2025-05-17T00:34:17.485336457Z" level=info msg="RemoveContainer for \"c00b35510b283c53078880de224dea56f90291f1f09760a4741865069c8b260c\" returns successfully" May 17 00:34:17.500926 env[1214]: time="2025-05-17T00:34:17.500881010Z" level=info msg="StopPodSandbox for \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\"" May 17 00:34:17.530407 kubelet[1967]: I0517 00:34:17.530346 1967 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="5853ea90-86a9-4202-bfdd-da96ffcf909f" path="/var/lib/kubelet/pods/5853ea90-86a9-4202-bfdd-da96ffcf909f/volumes" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.536 [WARNING][5014] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0", GenerateName:"calico-kube-controllers-7d4d498b95-", Namespace:"calico-system", SelfLink:"", UID:"7a8e0eef-ddac-4da9-91c0-25695122d2d3", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4d498b95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6", Pod:"calico-kube-controllers-7d4d498b95-mp7lh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib24270a2677", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.536 [INFO][5014] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.536 [INFO][5014] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" iface="eth0" netns="" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.536 [INFO][5014] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.536 [INFO][5014] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.566 [INFO][5024] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.566 [INFO][5024] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.566 [INFO][5024] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.572 [WARNING][5024] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.572 [INFO][5024] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.573 [INFO][5024] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:17.576546 env[1214]: 2025-05-17 00:34:17.575 [INFO][5014] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.577001 env[1214]: time="2025-05-17T00:34:17.576588474Z" level=info msg="TearDown network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\" successfully" May 17 00:34:17.577001 env[1214]: time="2025-05-17T00:34:17.576635717Z" level=info msg="StopPodSandbox for \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\" returns successfully" May 17 00:34:17.577472 env[1214]: time="2025-05-17T00:34:17.577433171Z" level=info msg="RemovePodSandbox for \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\"" May 17 00:34:17.577540 env[1214]: time="2025-05-17T00:34:17.577486676Z" level=info msg="Forcibly stopping sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\"" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.610 [WARNING][5042] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0", GenerateName:"calico-kube-controllers-7d4d498b95-", Namespace:"calico-system", SelfLink:"", UID:"7a8e0eef-ddac-4da9-91c0-25695122d2d3", ResourceVersion:"1241", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7d4d498b95", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5d6f2059107305ad5f36adda717e4ba713b7b029554a98c687d9558084cb36d6", Pod:"calico-kube-controllers-7d4d498b95-mp7lh", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calib24270a2677", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.611 [INFO][5042] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.611 [INFO][5042] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" iface="eth0" netns="" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.611 [INFO][5042] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.611 [INFO][5042] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.632 [INFO][5050] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.632 [INFO][5050] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.632 [INFO][5050] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.642 [WARNING][5050] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.642 [INFO][5050] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" HandleID="k8s-pod-network.8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" Workload="localhost-k8s-calico--kube--controllers--7d4d498b95--mp7lh-eth0" May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.644 [INFO][5050] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:17.649224 env[1214]: 2025-05-17 00:34:17.647 [INFO][5042] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab" May 17 00:34:17.649999 env[1214]: time="2025-05-17T00:34:17.649226219Z" level=info msg="TearDown network for sandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\" successfully" May 17 00:34:17.652798 env[1214]: time="2025-05-17T00:34:17.652755100Z" level=info msg="RemovePodSandbox \"8f1fcb1d18eea8cf02cac6208b69e201854cc8069245676069da564f097b19ab\" returns successfully" May 17 00:34:17.653364 env[1214]: time="2025-05-17T00:34:17.653329546Z" level=info msg="StopPodSandbox for \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\"" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.686 [WARNING][5071] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7", ResourceVersion:"1233", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555", Pod:"goldmane-78d55f7ddc-vhb9n", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali703a656194c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.687 [INFO][5071] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.687 [INFO][5071] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" iface="eth0" netns="" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.687 [INFO][5071] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.687 [INFO][5071] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.710 [INFO][5080] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.710 [INFO][5080] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.710 [INFO][5080] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.717 [WARNING][5080] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.717 [INFO][5080] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.719 [INFO][5080] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:17.723469 env[1214]: 2025-05-17 00:34:17.721 [INFO][5071] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.724692 env[1214]: time="2025-05-17T00:34:17.723498960Z" level=info msg="TearDown network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\" successfully" May 17 00:34:17.724692 env[1214]: time="2025-05-17T00:34:17.723536223Z" level=info msg="StopPodSandbox for \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\" returns successfully" May 17 00:34:17.724692 env[1214]: time="2025-05-17T00:34:17.724137663Z" level=info msg="RemovePodSandbox for \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\"" May 17 00:34:17.724692 env[1214]: time="2025-05-17T00:34:17.724203571Z" level=info msg="Forcibly stopping sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\"" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.760 [WARNING][5097] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0", GenerateName:"goldmane-78d55f7ddc-", Namespace:"calico-system", SelfLink:"", UID:"6355ee6b-a9d4-44f9-9931-2ea96bcf14a7", ResourceVersion:"1233", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"78d55f7ddc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1a5d59c10b3c7b1f160e7bed41483b107f738e920d6f97a8b1802b8259636555", Pod:"goldmane-78d55f7ddc-vhb9n", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali703a656194c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.760 [INFO][5097] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.760 [INFO][5097] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" iface="eth0" netns="" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.760 [INFO][5097] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.760 [INFO][5097] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.795 [INFO][5106] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.795 [INFO][5106] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.795 [INFO][5106] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.801 [WARNING][5106] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.801 [INFO][5106] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" HandleID="k8s-pod-network.de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" Workload="localhost-k8s-goldmane--78d55f7ddc--vhb9n-eth0" May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.802 [INFO][5106] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:17.806202 env[1214]: 2025-05-17 00:34:17.804 [INFO][5097] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0" May 17 00:34:17.806789 env[1214]: time="2025-05-17T00:34:17.806246240Z" level=info msg="TearDown network for sandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\" successfully" May 17 00:34:17.810463 env[1214]: time="2025-05-17T00:34:17.810433621Z" level=info msg="RemovePodSandbox \"de48fa509ddf9997e75458cbc0b2a226e72114999ca66fa19c2cc069e22008f0\" returns successfully" May 17 00:34:17.810920 env[1214]: time="2025-05-17T00:34:17.810891088Z" level=info msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\"" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.846 [WARNING][5124] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.846 [INFO][5124] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.846 [INFO][5124] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" iface="eth0" netns="" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.846 [INFO][5124] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.846 [INFO][5124] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.876 [INFO][5132] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.877 [INFO][5132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.877 [INFO][5132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.883 [WARNING][5132] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.883 [INFO][5132] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.884 [INFO][5132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:17.887874 env[1214]: 2025-05-17 00:34:17.886 [INFO][5124] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.888584 env[1214]: time="2025-05-17T00:34:17.887909303Z" level=info msg="TearDown network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" successfully" May 17 00:34:17.888584 env[1214]: time="2025-05-17T00:34:17.887946155Z" level=info msg="StopPodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" returns successfully" May 17 00:34:17.888584 env[1214]: time="2025-05-17T00:34:17.888458530Z" level=info msg="RemovePodSandbox for \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\"" May 17 00:34:17.888584 env[1214]: time="2025-05-17T00:34:17.888488529Z" level=info msg="Forcibly stopping sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\"" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.917 [WARNING][5150] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.917 [INFO][5150] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.917 [INFO][5150] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" iface="eth0" netns="" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.917 [INFO][5150] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.917 [INFO][5150] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.974 [INFO][5159] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.974 [INFO][5159] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.974 [INFO][5159] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.982 [WARNING][5159] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.982 [INFO][5159] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" HandleID="k8s-pod-network.36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.984 [INFO][5159] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:17.987852 env[1214]: 2025-05-17 00:34:17.985 [INFO][5150] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3" May 17 00:34:17.988493 env[1214]: time="2025-05-17T00:34:17.987876452Z" level=info msg="TearDown network for sandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" successfully" May 17 00:34:17.995871 env[1214]: time="2025-05-17T00:34:17.995814047Z" level=info msg="RemovePodSandbox \"36d9a5134c4a819619a8c555bebb4516bd2f21c9a3d6be99d22d8039723c6aa3\" returns successfully" May 17 00:34:17.996453 env[1214]: time="2025-05-17T00:34:17.996416860Z" level=info msg="StopPodSandbox for \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\"" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.032 [WARNING][5177] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.033 [INFO][5177] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.033 [INFO][5177] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" iface="eth0" netns="" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.033 [INFO][5177] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.033 [INFO][5177] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.055 [INFO][5186] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.055 [INFO][5186] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.055 [INFO][5186] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.064 [WARNING][5186] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.064 [INFO][5186] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.071 [INFO][5186] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:18.075513 env[1214]: 2025-05-17 00:34:18.073 [INFO][5177] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.075513 env[1214]: time="2025-05-17T00:34:18.075489290Z" level=info msg="TearDown network for sandbox \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" successfully" May 17 00:34:18.075987 env[1214]: time="2025-05-17T00:34:18.075528883Z" level=info msg="StopPodSandbox for \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" returns successfully" May 17 00:34:18.076045 env[1214]: time="2025-05-17T00:34:18.076014756Z" level=info msg="RemovePodSandbox for \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\"" May 17 00:34:18.076093 env[1214]: time="2025-05-17T00:34:18.076052595Z" level=info msg="Forcibly stopping sandbox \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\"" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.110 [WARNING][5204] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.111 [INFO][5204] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.111 [INFO][5204] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" iface="eth0" netns="" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.111 [INFO][5204] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.111 [INFO][5204] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.132 [INFO][5213] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.133 [INFO][5213] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.133 [INFO][5213] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.141 [WARNING][5213] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.141 [INFO][5213] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" HandleID="k8s-pod-network.86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" Workload="localhost-k8s-calico--apiserver--84df797bd4--qdn5m-eth0" May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.142 [INFO][5213] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:18.147094 env[1214]: 2025-05-17 00:34:18.144 [INFO][5204] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e" May 17 00:34:18.147972 env[1214]: time="2025-05-17T00:34:18.147129333Z" level=info msg="TearDown network for sandbox \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" successfully" May 17 00:34:18.151131 env[1214]: time="2025-05-17T00:34:18.151104992Z" level=info msg="RemovePodSandbox \"86da3993e53f3fbe9ff33f84e5b6dc216021764c1b0d604566d9771a3478e31e\" returns successfully" May 17 00:34:18.151596 env[1214]: time="2025-05-17T00:34:18.151564447Z" level=info msg="StopPodSandbox for \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\"" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.182 [WARNING][5231] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0", GenerateName:"calico-apiserver-84df797bd4-", Namespace:"calico-apiserver", SelfLink:"", UID:"880e53bc-71af-47ea-ad2d-ce9dfe939fad", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84df797bd4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5", Pod:"calico-apiserver-84df797bd4-hhlmn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60134facb12", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.182 [INFO][5231] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.182 [INFO][5231] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" iface="eth0" netns="" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.182 [INFO][5231] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.182 [INFO][5231] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.213 [INFO][5239] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.213 [INFO][5239] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.213 [INFO][5239] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.218 [WARNING][5239] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.218 [INFO][5239] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.220 [INFO][5239] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:18.223448 env[1214]: 2025-05-17 00:34:18.221 [INFO][5231] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.224301 env[1214]: time="2025-05-17T00:34:18.223473454Z" level=info msg="TearDown network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\" successfully" May 17 00:34:18.224301 env[1214]: time="2025-05-17T00:34:18.223506916Z" level=info msg="StopPodSandbox for \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\" returns successfully" May 17 00:34:18.224301 env[1214]: time="2025-05-17T00:34:18.224047910Z" level=info msg="RemovePodSandbox for \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\"" May 17 00:34:18.224301 env[1214]: time="2025-05-17T00:34:18.224098994Z" level=info msg="Forcibly stopping sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\"" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.316 [WARNING][5256] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0", GenerateName:"calico-apiserver-84df797bd4-", Namespace:"calico-apiserver", SelfLink:"", UID:"880e53bc-71af-47ea-ad2d-ce9dfe939fad", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 33, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"84df797bd4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5", Pod:"calico-apiserver-84df797bd4-hhlmn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali60134facb12", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.317 [INFO][5256] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.317 [INFO][5256] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" iface="eth0" netns="" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.317 [INFO][5256] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.317 [INFO][5256] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.336 [INFO][5264] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.336 [INFO][5264] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.336 [INFO][5264] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.359 [WARNING][5264] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.359 [INFO][5264] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" HandleID="k8s-pod-network.6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.386 [INFO][5264] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:18.389992 env[1214]: 2025-05-17 00:34:18.388 [INFO][5256] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388" May 17 00:34:18.389992 env[1214]: time="2025-05-17T00:34:18.389946841Z" level=info msg="TearDown network for sandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\" successfully" May 17 00:34:18.617564 env[1214]: time="2025-05-17T00:34:18.617489496Z" level=info msg="RemovePodSandbox \"6d89287a9042fe17231a8b5615d8958aa2117efea2e25c3a374dfe555ae95388\" returns successfully" May 17 00:34:18.617838 env[1214]: time="2025-05-17T00:34:18.617810427Z" level=info msg="StopPodSandbox for \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\"" May 17 00:34:18.672934 env[1214]: time="2025-05-17T00:34:18.672819884Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.646 [WARNING][5283] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1", ResourceVersion:"1203", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86", Pod:"coredns-674b8bbfcf-dpsr2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b526988fe4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.647 [INFO][5283] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.647 [INFO][5283] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" iface="eth0" netns="" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.647 [INFO][5283] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.647 [INFO][5283] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.664 [INFO][5291] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.665 [INFO][5291] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.665 [INFO][5291] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.671 [WARNING][5291] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.672 [INFO][5291] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.674 [INFO][5291] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:18.677719 env[1214]: 2025-05-17 00:34:18.676 [INFO][5283] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.678163 env[1214]: time="2025-05-17T00:34:18.677757181Z" level=info msg="TearDown network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\" successfully" May 17 00:34:18.678163 env[1214]: time="2025-05-17T00:34:18.677788419Z" level=info msg="StopPodSandbox for \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\" returns successfully" May 17 00:34:18.678250 env[1214]: time="2025-05-17T00:34:18.678195987Z" level=info msg="RemovePodSandbox for \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\"" May 17 00:34:18.678250 env[1214]: time="2025-05-17T00:34:18.678221765Z" level=info msg="Forcibly stopping sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\"" May 17 00:34:18.681467 env[1214]: time="2025-05-17T00:34:18.681400479Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:18.685000 env[1214]: time="2025-05-17T00:34:18.684939165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:18.686561 env[1214]: time="2025-05-17T00:34:18.686494354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:18.687276 env[1214]: time="2025-05-17T00:34:18.687165809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:34:18.693085 env[1214]: time="2025-05-17T00:34:18.693022256Z" level=info msg="CreateContainer within sandbox \"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:34:18.710495 env[1214]: time="2025-05-17T00:34:18.710436633Z" level=info msg="CreateContainer within sandbox \"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5c19439985ba6fc17038af2a6b60589a5890c2ed0bbc023af2ff8c88e71a1b2d\"" May 17 00:34:18.712114 env[1214]: time="2025-05-17T00:34:18.712089382Z" level=info msg="StartContainer for \"5c19439985ba6fc17038af2a6b60589a5890c2ed0bbc023af2ff8c88e71a1b2d\"" May 17 00:34:18.746999 systemd[1]: run-containerd-runc-k8s.io-5c19439985ba6fc17038af2a6b60589a5890c2ed0bbc023af2ff8c88e71a1b2d-runc.U6ni42.mount: Deactivated successfully. May 17 00:34:18.749388 systemd[1]: Started cri-containerd-5c19439985ba6fc17038af2a6b60589a5890c2ed0bbc023af2ff8c88e71a1b2d.scope. May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.718 [WARNING][5309] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"f9ab2ff4-724f-4f25-a7c8-065a4cf72fd1", ResourceVersion:"1203", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9d3b5718d4b4a57c76d2f6dd78a4d473baf816c083fe19e51c63727d7a348c86", Pod:"coredns-674b8bbfcf-dpsr2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b526988fe4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.719 [INFO][5309] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.719 [INFO][5309] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" iface="eth0" netns="" May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.719 [INFO][5309] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.719 [INFO][5309] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.741 [INFO][5325] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.742 [INFO][5325] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.742 [INFO][5325] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.750 [WARNING][5325] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.750 [INFO][5325] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" HandleID="k8s-pod-network.0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" Workload="localhost-k8s-coredns--674b8bbfcf--dpsr2-eth0" May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.753 [INFO][5325] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:18.761724 env[1214]: 2025-05-17 00:34:18.759 [INFO][5309] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19" May 17 00:34:18.762523 env[1214]: time="2025-05-17T00:34:18.761793835Z" level=info msg="TearDown network for sandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\" successfully" May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff48848c368 items=0 ppid=4535 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313934333939383562613666633137303338616632613662363035 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit: BPF prog-id=218 op=LOAD May 17 00:34:18.765000 audit[5330]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027beb8 items=0 ppid=4535 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313934333939383562613666633137303338616632613662363035 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit: BPF prog-id=219 op=LOAD May 17 00:34:18.765000 audit[5330]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027bf08 items=0 ppid=4535 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313934333939383562613666633137303338616632613662363035 May 17 00:34:18.765000 audit: BPF prog-id=219 op=UNLOAD May 17 00:34:18.765000 audit: BPF prog-id=218 op=UNLOAD May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { perfmon } for pid=5330 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit[5330]: AVC avc: denied { bpf } for pid=5330 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:18.765000 audit: BPF prog-id=220 op=LOAD May 17 00:34:18.765000 audit[5330]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027bf98 items=0 ppid=4535 pid=5330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:18.765000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563313934333939383562613666633137303338616632613662363035 May 17 00:34:18.871661 env[1214]: time="2025-05-17T00:34:18.871603754Z" level=info msg="StartContainer for \"5c19439985ba6fc17038af2a6b60589a5890c2ed0bbc023af2ff8c88e71a1b2d\" returns successfully" May 17 00:34:18.872573 env[1214]: time="2025-05-17T00:34:18.872526361Z" level=info msg="RemovePodSandbox \"0d42bc0d8ad01d99e7c479bc4171b6562b5c7a324dd401dde823bf7d48dcee19\" returns successfully" May 17 00:34:18.873138 env[1214]: time="2025-05-17T00:34:18.873004740Z" level=info msg="StopPodSandbox for \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\"" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.907 [WARNING][5374] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ed378fdd-93ad-4dac-aafd-61b13548bb53", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851", Pod:"coredns-674b8bbfcf-xv8q2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9b7a3663675", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.907 [INFO][5374] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.907 [INFO][5374] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" iface="eth0" netns="" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.907 [INFO][5374] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.907 [INFO][5374] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.928 [INFO][5383] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.928 [INFO][5383] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.928 [INFO][5383] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.933 [WARNING][5383] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.933 [INFO][5383] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.935 [INFO][5383] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:18.938888 env[1214]: 2025-05-17 00:34:18.936 [INFO][5374] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:18.938888 env[1214]: time="2025-05-17T00:34:18.938840853Z" level=info msg="TearDown network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\" successfully" May 17 00:34:18.938888 env[1214]: time="2025-05-17T00:34:18.938880665Z" level=info msg="StopPodSandbox for \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\" returns successfully" May 17 00:34:18.939595 env[1214]: time="2025-05-17T00:34:18.939410280Z" level=info msg="RemovePodSandbox for \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\"" May 17 00:34:18.939595 env[1214]: time="2025-05-17T00:34:18.939442638Z" level=info msg="Forcibly stopping sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\"" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.970 [WARNING][5400] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0", GenerateName:"coredns-674b8bbfcf-", Namespace:"kube-system", SelfLink:"", UID:"ed378fdd-93ad-4dac-aafd-61b13548bb53", ResourceVersion:"1153", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 24, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"674b8bbfcf", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d1362eaaa6ea77d3dc3ee71e2c2469400a2acec72ccff513f8b89c53421d7851", Pod:"coredns-674b8bbfcf-xv8q2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9b7a3663675", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.970 [INFO][5400] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.970 [INFO][5400] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" iface="eth0" netns="" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.970 [INFO][5400] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.970 [INFO][5400] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.992 [INFO][5409] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.992 [INFO][5409] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.992 [INFO][5409] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.998 [WARNING][5409] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.998 [INFO][5409] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" HandleID="k8s-pod-network.6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" Workload="localhost-k8s-coredns--674b8bbfcf--xv8q2-eth0" May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:18.999 [INFO][5409] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:19.003068 env[1214]: 2025-05-17 00:34:19.001 [INFO][5400] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0" May 17 00:34:19.003667 env[1214]: time="2025-05-17T00:34:19.003095734Z" level=info msg="TearDown network for sandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\" successfully" May 17 00:34:19.007239 env[1214]: time="2025-05-17T00:34:19.007210624Z" level=info msg="RemovePodSandbox \"6caa5c000838d1e76cd6b15fa4a34bb10e8120ceea81e80551d834f09f95e1d0\" returns successfully" May 17 00:34:19.007736 env[1214]: time="2025-05-17T00:34:19.007697671Z" level=info msg="StopPodSandbox for \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\"" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.038 [WARNING][5426] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" WorkloadEndpoint="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.038 [INFO][5426] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.038 [INFO][5426] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" iface="eth0" netns="" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.038 [INFO][5426] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.038 [INFO][5426] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.056 [INFO][5434] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.056 [INFO][5434] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.056 [INFO][5434] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.063 [WARNING][5434] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.063 [INFO][5434] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.064 [INFO][5434] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:19.068493 env[1214]: 2025-05-17 00:34:19.066 [INFO][5426] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.069153 env[1214]: time="2025-05-17T00:34:19.068512512Z" level=info msg="TearDown network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\" successfully" May 17 00:34:19.069153 env[1214]: time="2025-05-17T00:34:19.068545102Z" level=info msg="StopPodSandbox for \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\" returns successfully" May 17 00:34:19.069153 env[1214]: time="2025-05-17T00:34:19.069119830Z" level=info msg="RemovePodSandbox for \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\"" May 17 00:34:19.069286 env[1214]: time="2025-05-17T00:34:19.069161648Z" level=info msg="Forcibly stopping sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\"" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.100 [WARNING][5453] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" WorkloadEndpoint="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.101 [INFO][5453] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.101 [INFO][5453] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" iface="eth0" netns="" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.101 [INFO][5453] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.101 [INFO][5453] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.118 [INFO][5461] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.118 [INFO][5461] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.119 [INFO][5461] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.125 [WARNING][5461] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.125 [INFO][5461] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" HandleID="k8s-pod-network.006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" Workload="localhost-k8s-whisker--6879d654d8--5jtft-eth0" May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.126 [INFO][5461] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:19.129856 env[1214]: 2025-05-17 00:34:19.128 [INFO][5453] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996" May 17 00:34:19.130525 env[1214]: time="2025-05-17T00:34:19.129875774Z" level=info msg="TearDown network for sandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\" successfully" May 17 00:34:19.133598 env[1214]: time="2025-05-17T00:34:19.133562485Z" level=info msg="RemovePodSandbox \"006a5a5374888656e25420ded56c982e17c394385e6c8b131c48fc3468d81996\" returns successfully" May 17 00:34:19.134109 env[1214]: time="2025-05-17T00:34:19.134081160Z" level=info msg="StopPodSandbox for \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\"" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.161 [WARNING][5479] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t6g96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34edfeda-9b15-4dd5-8e02-698e32cac2dc", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282", Pod:"csi-node-driver-t6g96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif5603d0ab5b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.162 [INFO][5479] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.162 [INFO][5479] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" iface="eth0" netns="" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.162 [INFO][5479] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.162 [INFO][5479] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.178 [INFO][5487] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.178 [INFO][5487] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.178 [INFO][5487] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.183 [WARNING][5487] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.183 [INFO][5487] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.184 [INFO][5487] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:19.188154 env[1214]: 2025-05-17 00:34:19.186 [INFO][5479] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.188690 env[1214]: time="2025-05-17T00:34:19.188200359Z" level=info msg="TearDown network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\" successfully" May 17 00:34:19.188690 env[1214]: time="2025-05-17T00:34:19.188240923Z" level=info msg="StopPodSandbox for \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\" returns successfully" May 17 00:34:19.188764 env[1214]: time="2025-05-17T00:34:19.188731287Z" level=info msg="RemovePodSandbox for \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\"" May 17 00:34:19.188794 env[1214]: time="2025-05-17T00:34:19.188762974Z" level=info msg="Forcibly stopping sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\"" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.219 [WARNING][5503] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--t6g96-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"34edfeda-9b15-4dd5-8e02-698e32cac2dc", ResourceVersion:"1163", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 36, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"78f6f74485", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0c503e8ef50b837922e473dbf81502f27af6ee9bc9355065f574b04977129282", Pod:"csi-node-driver-t6g96", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.137/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calif5603d0ab5b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.220 [INFO][5503] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.220 [INFO][5503] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" iface="eth0" netns="" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.220 [INFO][5503] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.220 [INFO][5503] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.236 [INFO][5511] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.236 [INFO][5511] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.236 [INFO][5511] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.243 [WARNING][5511] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.243 [INFO][5511] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" HandleID="k8s-pod-network.4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" Workload="localhost-k8s-csi--node--driver--t6g96-eth0" May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.245 [INFO][5511] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:19.248611 env[1214]: 2025-05-17 00:34:19.246 [INFO][5503] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207" May 17 00:34:19.249358 env[1214]: time="2025-05-17T00:34:19.248590407Z" level=info msg="TearDown network for sandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\" successfully" May 17 00:34:19.253573 env[1214]: time="2025-05-17T00:34:19.253515279Z" level=info msg="RemovePodSandbox \"4250432e7459ba623d44bdde8049c68adc5fe8d1ad985363c44df3c52aeba207\" returns successfully" May 17 00:34:19.254060 env[1214]: time="2025-05-17T00:34:19.254021161Z" level=info msg="StopPodSandbox for \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\"" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.282 [WARNING][5530] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0", GenerateName:"calico-apiserver-7b44b7576b-", Namespace:"calico-apiserver", SelfLink:"", UID:"157d8a8b-b79c-4a8c-936e-7a1b77262093", ResourceVersion:"1253", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b44b7576b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5", Pod:"calico-apiserver-7b44b7576b-gz6w9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2f5b7d31d61", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.282 [INFO][5530] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.282 [INFO][5530] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" iface="eth0" netns="" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.282 [INFO][5530] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.282 [INFO][5530] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.298 [INFO][5538] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.298 [INFO][5538] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.298 [INFO][5538] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.303 [WARNING][5538] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.303 [INFO][5538] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.305 [INFO][5538] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:19.309623 env[1214]: 2025-05-17 00:34:19.307 [INFO][5530] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.310240 env[1214]: time="2025-05-17T00:34:19.309667162Z" level=info msg="TearDown network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\" successfully" May 17 00:34:19.310240 env[1214]: time="2025-05-17T00:34:19.309696215Z" level=info msg="StopPodSandbox for \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\" returns successfully" May 17 00:34:19.310240 env[1214]: time="2025-05-17T00:34:19.310103686Z" level=info msg="RemovePodSandbox for \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\"" May 17 00:34:19.310240 env[1214]: time="2025-05-17T00:34:19.310133551Z" level=info msg="Forcibly stopping sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\"" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.342 [WARNING][5555] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0", GenerateName:"calico-apiserver-7b44b7576b-", Namespace:"calico-apiserver", SelfLink:"", UID:"157d8a8b-b79c-4a8c-936e-7a1b77262093", ResourceVersion:"1253", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7b44b7576b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"61718eb86b64a56fe49a1af24648dfb44a7bb1e98039819637d14426abf97dd5", Pod:"calico-apiserver-7b44b7576b-gz6w9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2f5b7d31d61", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.342 [INFO][5555] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.342 [INFO][5555] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" iface="eth0" netns="" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.342 [INFO][5555] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.342 [INFO][5555] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.358 [INFO][5564] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.358 [INFO][5564] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.358 [INFO][5564] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.364 [WARNING][5564] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.364 [INFO][5564] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" HandleID="k8s-pod-network.fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" Workload="localhost-k8s-calico--apiserver--7b44b7576b--gz6w9-eth0" May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.365 [INFO][5564] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:19.368601 env[1214]: 2025-05-17 00:34:19.367 [INFO][5555] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61" May 17 00:34:19.369207 env[1214]: time="2025-05-17T00:34:19.368640381Z" level=info msg="TearDown network for sandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\" successfully" May 17 00:34:19.372331 env[1214]: time="2025-05-17T00:34:19.372284845Z" level=info msg="RemovePodSandbox \"fe24d3523a6d4de9d8cf94a837f4e864cadcc6fef71e15937aa69496c8253b61\" returns successfully" May 17 00:34:19.501141 kubelet[1967]: I0517 00:34:19.500963 1967 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-t6g96" podStartSLOduration=30.791038582 podStartE2EDuration="43.500943364s" podCreationTimestamp="2025-05-17 00:33:36 +0000 UTC" firstStartedPulling="2025-05-17 00:34:05.97812236 +0000 UTC m=+48.572186548" lastFinishedPulling="2025-05-17 00:34:18.688027142 +0000 UTC m=+61.282091330" observedRunningTime="2025-05-17 00:34:19.500753384 +0000 UTC m=+62.094817602" watchObservedRunningTime="2025-05-17 00:34:19.500943364 +0000 UTC m=+62.095007612" May 17 00:34:19.632156 kubelet[1967]: I0517 00:34:19.632114 1967 csi_plugin.go:106] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:34:19.633659 kubelet[1967]: I0517 00:34:19.633639 1967 csi_plugin.go:119] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:34:21.454983 systemd[1]: Started sshd@14-10.0.0.66:22-10.0.0.1:46062.service. May 17 00:34:21.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.66:22-10.0.0.1:46062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:21.456221 kernel: kauditd_printk_skb: 140 callbacks suppressed May 17 00:34:21.456284 kernel: audit: type=1130 audit(1747442061.453:1503): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.66:22-10.0.0.1:46062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:21.488588 systemd[1]: run-containerd-runc-k8s.io-b76a0a53013e423eb20784434d884abd366d7c57af455476d4cd2e0d7d738727-runc.iSUPdf.mount: Deactivated successfully. May 17 00:34:21.493000 audit[5584]: USER_ACCT pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.498735 sshd[5584]: Accepted publickey for core from 10.0.0.1 port 46062 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:21.499208 kernel: audit: type=1101 audit(1747442061.493:1504): pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.498000 audit[5584]: CRED_ACQ pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.501795 sshd[5584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:21.510779 kernel: audit: type=1103 audit(1747442061.498:1505): pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.510882 kernel: audit: type=1006 audit(1747442061.500:1506): pid=5584 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:34:21.510911 kernel: audit: type=1300 audit(1747442061.500:1506): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc7a1a440 a2=3 a3=0 items=0 ppid=1 pid=5584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:21.500000 audit[5584]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc7a1a440 a2=3 a3=0 items=0 ppid=1 pid=5584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:21.506658 systemd[1]: Started session-15.scope. May 17 00:34:21.507839 systemd-logind[1203]: New session 15 of user core. May 17 00:34:21.500000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:21.513286 kernel: audit: type=1327 audit(1747442061.500:1506): proctitle=737368643A20636F7265205B707269765D May 17 00:34:21.512000 audit[5584]: USER_START pid=5584 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.514000 audit[5601]: CRED_ACQ pid=5601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.522292 kernel: audit: type=1105 audit(1747442061.512:1507): pid=5584 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.522334 kernel: audit: type=1103 audit(1747442061.514:1508): pid=5601 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.672133 sshd[5584]: pam_unix(sshd:session): session closed for user core May 17 00:34:21.671000 audit[5584]: USER_END pid=5584 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.674613 systemd[1]: sshd@14-10.0.0.66:22-10.0.0.1:46062.service: Deactivated successfully. May 17 00:34:21.675414 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:34:21.676188 systemd-logind[1203]: Session 15 logged out. Waiting for processes to exit. May 17 00:34:21.676927 systemd-logind[1203]: Removed session 15. May 17 00:34:21.671000 audit[5584]: CRED_DISP pid=5584 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.681243 kernel: audit: type=1106 audit(1747442061.671:1509): pid=5584 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.681291 kernel: audit: type=1104 audit(1747442061.671:1510): pid=5584 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:21.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.66:22-10.0.0.1:46062 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:22.552000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:22.552000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001a55680 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:34:22.552000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:22.553000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:22.553000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000916660 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:34:22.553000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:22.554000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:22.554000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000589ee0 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:34:22.554000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:22.555000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:22.555000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000589f20 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:34:22.555000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:26.511075 env[1214]: time="2025-05-17T00:34:26.510821907Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:34:26.683393 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:34:26.683517 kernel: audit: type=1130 audit(1747442066.679:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.66:22-10.0.0.1:57408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:26.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.66:22-10.0.0.1:57408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:26.680248 systemd[1]: Started sshd@15-10.0.0.66:22-10.0.0.1:57408.service. May 17 00:34:26.739000 audit[5626]: USER_ACCT pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.745728 sshd[5626]: Accepted publickey for core from 10.0.0.1 port 57408 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:26.746481 kernel: audit: type=1101 audit(1747442066.739:1517): pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.746000 audit[5626]: CRED_ACQ pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.747262 sshd[5626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:26.762420 kernel: audit: type=1103 audit(1747442066.746:1518): pid=5626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.762529 kernel: audit: type=1006 audit(1747442066.746:1519): pid=5626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:34:26.762557 kernel: audit: type=1300 audit(1747442066.746:1519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc2de81a0 a2=3 a3=0 items=0 ppid=1 pid=5626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:26.746000 audit[5626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc2de81a0 a2=3 a3=0 items=0 ppid=1 pid=5626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:26.746000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:26.769888 kernel: audit: type=1327 audit(1747442066.746:1519): proctitle=737368643A20636F7265205B707269765D May 17 00:34:26.769947 systemd-logind[1203]: New session 16 of user core. May 17 00:34:26.772202 systemd[1]: Started session-16.scope. May 17 00:34:26.788000 audit[5626]: USER_START pid=5626 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.802211 kernel: audit: type=1105 audit(1747442066.788:1520): pid=5626 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.834000 audit[5628]: CRED_ACQ pid=5628 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.842438 kernel: audit: type=1103 audit(1747442066.834:1521): pid=5628 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:26.846596 env[1214]: time="2025-05-17T00:34:26.846525122Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:26.851489 env[1214]: time="2025-05-17T00:34:26.851403072Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:26.851730 kubelet[1967]: E0517 00:34:26.851658 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:26.851730 kubelet[1967]: E0517 00:34:26.851719 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:26.852124 kubelet[1967]: E0517 00:34:26.851965 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:70e935a2e96d40cfaa78ad64750c7ee6,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-lb74r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6c65d694b6-2xhfb_calico-system(7614d727-5145-486e-8d21-b867c95fe30e): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:26.852824 env[1214]: time="2025-05-17T00:34:26.852615342Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:34:27.004194 sshd[5626]: pam_unix(sshd:session): session closed for user core May 17 00:34:27.003000 audit[5626]: USER_END pid=5626 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:27.009772 systemd[1]: sshd@15-10.0.0.66:22-10.0.0.1:57408.service: Deactivated successfully. May 17 00:34:27.011249 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:34:27.012289 systemd-logind[1203]: Session 16 logged out. Waiting for processes to exit. May 17 00:34:27.003000 audit[5626]: CRED_DISP pid=5626 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:27.025735 systemd-logind[1203]: Removed session 16. May 17 00:34:27.028400 kernel: audit: type=1106 audit(1747442067.003:1522): pid=5626 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:27.028512 kernel: audit: type=1104 audit(1747442067.003:1523): pid=5626 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:27.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.66:22-10.0.0.1:57408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:27.110435 env[1214]: time="2025-05-17T00:34:27.110131092Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:27.112980 env[1214]: time="2025-05-17T00:34:27.112781478Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:27.113347 kubelet[1967]: E0517 00:34:27.113199 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:27.113347 kubelet[1967]: E0517 00:34:27.113271 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:27.113828 kubelet[1967]: E0517 00:34:27.113594 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5xqs8,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-vhb9n_calico-system(6355ee6b-a9d4-44f9-9931-2ea96bcf14a7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:27.114205 env[1214]: time="2025-05-17T00:34:27.114142148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:34:27.125268 kubelet[1967]: E0517 00:34:27.125165 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:34:27.463343 env[1214]: time="2025-05-17T00:34:27.459563474Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:27.464802 env[1214]: time="2025-05-17T00:34:27.464631361Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:27.465099 kubelet[1967]: E0517 00:34:27.465034 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:27.465208 kubelet[1967]: E0517 00:34:27.465115 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:27.465383 kubelet[1967]: E0517 00:34:27.465328 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-lb74r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6c65d694b6-2xhfb_calico-system(7614d727-5145-486e-8d21-b867c95fe30e): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:27.472680 kubelet[1967]: E0517 00:34:27.472620 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6c65d694b6-2xhfb" podUID="7614d727-5145-486e-8d21-b867c95fe30e" May 17 00:34:29.514299 kubelet[1967]: E0517 00:34:29.511065 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:31.369941 systemd[1]: run-containerd-runc-k8s.io-b688ff8301184ae5cd21cb257fb44e38880f2c57a45c56b63e6d983a724969e5-runc.Aa8sy9.mount: Deactivated successfully. May 17 00:34:32.024029 systemd[1]: Started sshd@16-10.0.0.66:22-10.0.0.1:57424.service. May 17 00:34:32.044071 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:34:32.044307 kernel: audit: type=1130 audit(1747442072.025:1525): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.66:22-10.0.0.1:57424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:32.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.66:22-10.0.0.1:57424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:32.130000 audit[5664]: USER_ACCT pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.132170 sshd[5664]: Accepted publickey for core from 10.0.0.1 port 57424 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:32.142034 kernel: audit: type=1101 audit(1747442072.130:1526): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.155210 kernel: audit: type=1103 audit(1747442072.139:1527): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.155283 kernel: audit: type=1006 audit(1747442072.139:1528): pid=5664 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:34:32.155322 kernel: audit: type=1300 audit(1747442072.139:1528): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd06a0a0 a2=3 a3=0 items=0 ppid=1 pid=5664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:32.139000 audit[5664]: CRED_ACQ pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.139000 audit[5664]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffecd06a0a0 a2=3 a3=0 items=0 ppid=1 pid=5664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:32.141388 sshd[5664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:32.171221 kernel: audit: type=1327 audit(1747442072.139:1528): proctitle=737368643A20636F7265205B707269765D May 17 00:34:32.139000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:32.173047 systemd-logind[1203]: New session 17 of user core. May 17 00:34:32.189699 systemd[1]: Started session-17.scope. May 17 00:34:32.212000 audit[5664]: USER_START pid=5664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.225098 kernel: audit: type=1105 audit(1747442072.212:1529): pid=5664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.226097 kernel: audit: type=1103 audit(1747442072.212:1530): pid=5666 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.212000 audit[5666]: CRED_ACQ pid=5666 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.569728 sshd[5664]: pam_unix(sshd:session): session closed for user core May 17 00:34:32.570000 audit[5664]: USER_END pid=5664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.580570 systemd[1]: sshd@16-10.0.0.66:22-10.0.0.1:57424.service: Deactivated successfully. May 17 00:34:32.581404 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:34:32.582018 systemd-logind[1203]: Session 17 logged out. Waiting for processes to exit. May 17 00:34:32.570000 audit[5664]: CRED_DISP pid=5664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.596630 systemd-logind[1203]: Removed session 17. May 17 00:34:32.599347 kernel: audit: type=1106 audit(1747442072.570:1531): pid=5664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.599406 kernel: audit: type=1104 audit(1747442072.570:1532): pid=5664 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:32.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.66:22-10.0.0.1:57424 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:35.510589 kubelet[1967]: E0517 00:34:35.510535 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:36.509942 kubelet[1967]: E0517 00:34:36.509349 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:36.725000 audit[5683]: NETFILTER_CFG table=filter:135 family=2 entries=12 op=nft_register_rule pid=5683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:36.725000 audit[5683]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffed987010 a2=0 a3=7fffed986ffc items=0 ppid=2086 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:36.725000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:36.736000 audit[5683]: NETFILTER_CFG table=nat:136 family=2 entries=36 op=nft_register_rule pid=5683 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:36.736000 audit[5683]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffed987010 a2=0 a3=7fffed986ffc items=0 ppid=2086 pid=5683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:36.736000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:37.510980 kubelet[1967]: E0517 00:34:37.510939 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:37.598701 systemd[1]: Started sshd@17-10.0.0.66:22-10.0.0.1:35144.service. May 17 00:34:37.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.66:22-10.0.0.1:35144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.611081 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:34:37.611239 kernel: audit: type=1130 audit(1747442077.598:1536): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.66:22-10.0.0.1:35144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:37.719170 sshd[5685]: Accepted publickey for core from 10.0.0.1 port 35144 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:37.717000 audit[5685]: USER_ACCT pid=5685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:37.735327 kernel: audit: type=1101 audit(1747442077.717:1537): pid=5685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:37.735421 kernel: audit: type=1103 audit(1747442077.733:1538): pid=5685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:37.733000 audit[5685]: CRED_ACQ pid=5685 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:37.733910 sshd[5685]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:37.752222 kernel: audit: type=1006 audit(1747442077.733:1539): pid=5685 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 17 00:34:37.752337 kernel: audit: type=1300 audit(1747442077.733:1539): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed2b92670 a2=3 a3=0 items=0 ppid=1 pid=5685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:37.733000 audit[5685]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed2b92670 a2=3 a3=0 items=0 ppid=1 pid=5685 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:37.773055 systemd-logind[1203]: New session 18 of user core. May 17 00:34:37.779942 kernel: audit: type=1327 audit(1747442077.733:1539): proctitle=737368643A20636F7265205B707269765D May 17 00:34:37.733000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:37.780532 systemd[1]: Started session-18.scope. May 17 00:34:37.801000 audit[5685]: USER_START pid=5685 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:37.813000 audit[5687]: CRED_ACQ pid=5687 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:37.833208 kernel: audit: type=1105 audit(1747442077.801:1540): pid=5685 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:37.833370 kernel: audit: type=1103 audit(1747442077.813:1541): pid=5687 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.119245 sshd[5685]: pam_unix(sshd:session): session closed for user core May 17 00:34:38.123000 audit[5685]: USER_END pid=5685 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.128150 systemd[1]: sshd@17-10.0.0.66:22-10.0.0.1:35144.service: Deactivated successfully. May 17 00:34:38.129296 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:34:38.130386 kernel: audit: type=1106 audit(1747442078.123:1542): pid=5685 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.123000 audit[5685]: CRED_DISP pid=5685 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.133294 systemd-logind[1203]: Session 18 logged out. Waiting for processes to exit. May 17 00:34:38.135575 systemd-logind[1203]: Removed session 18. May 17 00:34:38.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.66:22-10.0.0.1:35144 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.140264 kernel: audit: type=1104 audit(1747442078.123:1543): pid=5685 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:40.760000 audit[5699]: NETFILTER_CFG table=filter:137 family=2 entries=12 op=nft_register_rule pid=5699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:40.760000 audit[5699]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffc7dd755c0 a2=0 a3=7ffc7dd755ac items=0 ppid=2086 pid=5699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:40.771000 audit[5699]: NETFILTER_CFG table=nat:138 family=2 entries=40 op=nft_register_chain pid=5699 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:40.771000 audit[5699]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffc7dd755c0 a2=0 a3=7ffc7dd755ac items=0 ppid=2086 pid=5699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:40.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:40.943013 env[1214]: time="2025-05-17T00:34:40.942945475Z" level=info msg="StopContainer for \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\" with timeout 30 (s)" May 17 00:34:40.950874 env[1214]: time="2025-05-17T00:34:40.944297155Z" level=info msg="Stop container \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\" with signal terminated" May 17 00:34:41.000408 systemd[1]: cri-containerd-8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f.scope: Deactivated successfully. May 17 00:34:41.000762 systemd[1]: cri-containerd-8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f.scope: Consumed 1.014s CPU time. May 17 00:34:40.999000 audit: BPF prog-id=199 op=UNLOAD May 17 00:34:41.009000 audit: BPF prog-id=202 op=UNLOAD May 17 00:34:41.057906 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f-rootfs.mount: Deactivated successfully. May 17 00:34:41.089600 env[1214]: time="2025-05-17T00:34:41.089511947Z" level=info msg="shim disconnected" id=8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f May 17 00:34:41.089600 env[1214]: time="2025-05-17T00:34:41.089568945Z" level=warning msg="cleaning up after shim disconnected" id=8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f namespace=k8s.io May 17 00:34:41.089600 env[1214]: time="2025-05-17T00:34:41.089582420Z" level=info msg="cleaning up dead shim" May 17 00:34:41.092000 audit[5719]: NETFILTER_CFG table=filter:139 family=2 entries=12 op=nft_register_rule pid=5719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:41.092000 audit[5719]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcd4cc9510 a2=0 a3=7ffcd4cc94fc items=0 ppid=2086 pid=5719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:41.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:41.101000 audit[5719]: NETFILTER_CFG table=nat:140 family=2 entries=40 op=nft_unregister_chain pid=5719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:41.101000 audit[5719]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7ffcd4cc9510 a2=0 a3=7ffcd4cc94fc items=0 ppid=2086 pid=5719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:41.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:41.108050 env[1214]: time="2025-05-17T00:34:41.108002377Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:34:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5720 runtime=io.containerd.runc.v2\n" May 17 00:34:41.146111 env[1214]: time="2025-05-17T00:34:41.145853328Z" level=info msg="StopContainer for \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\" returns successfully" May 17 00:34:41.146694 env[1214]: time="2025-05-17T00:34:41.146643937Z" level=info msg="StopPodSandbox for \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\"" May 17 00:34:41.146785 env[1214]: time="2025-05-17T00:34:41.146732175Z" level=info msg="Container to stop \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 17 00:34:41.155928 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5-shm.mount: Deactivated successfully. May 17 00:34:41.177020 systemd[1]: cri-containerd-0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5.scope: Deactivated successfully. May 17 00:34:41.176000 audit: BPF prog-id=167 op=UNLOAD May 17 00:34:41.181000 audit: BPF prog-id=170 op=UNLOAD May 17 00:34:41.230972 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5-rootfs.mount: Deactivated successfully. May 17 00:34:41.244427 env[1214]: time="2025-05-17T00:34:41.242835041Z" level=info msg="shim disconnected" id=0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5 May 17 00:34:41.244427 env[1214]: time="2025-05-17T00:34:41.242936162Z" level=warning msg="cleaning up after shim disconnected" id=0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5 namespace=k8s.io May 17 00:34:41.244427 env[1214]: time="2025-05-17T00:34:41.242983582Z" level=info msg="cleaning up dead shim" May 17 00:34:41.259495 env[1214]: time="2025-05-17T00:34:41.259237192Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:34:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5752 runtime=io.containerd.runc.v2\n" May 17 00:34:41.516232 kubelet[1967]: E0517 00:34:41.515661 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:34:41.528560 kubelet[1967]: E0517 00:34:41.522124 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6c65d694b6-2xhfb" podUID="7614d727-5145-486e-8d21-b867c95fe30e" May 17 00:34:41.586401 systemd-networkd[1029]: cali60134facb12: Link DOWN May 17 00:34:41.586409 systemd-networkd[1029]: cali60134facb12: Lost carrier May 17 00:34:41.613000 audit[5794]: NETFILTER_CFG table=filter:141 family=2 entries=59 op=nft_register_rule pid=5794 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:41.613000 audit[5794]: SYSCALL arch=c000003e syscall=46 success=yes exit=9064 a0=3 a1=7ffc25a824f0 a2=0 a3=7ffc25a824dc items=0 ppid=3499 pid=5794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:41.613000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:41.619000 audit[5794]: NETFILTER_CFG table=filter:142 family=2 entries=4 op=nft_unregister_chain pid=5794 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:41.619000 audit[5794]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffc25a824f0 a2=0 a3=564489458000 items=0 ppid=3499 pid=5794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:41.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:41.639784 kubelet[1967]: I0517 00:34:41.639575 1967 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.566 [INFO][5781] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.578 [INFO][5781] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" iface="eth0" netns="/var/run/netns/cni-8dc3f820-b9f1-df38-0e4b-f3479d4098d9" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.579 [INFO][5781] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" iface="eth0" netns="/var/run/netns/cni-8dc3f820-b9f1-df38-0e4b-f3479d4098d9" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.638 [INFO][5781] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" after=59.680144ms iface="eth0" netns="/var/run/netns/cni-8dc3f820-b9f1-df38-0e4b-f3479d4098d9" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.641 [INFO][5781] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.641 [INFO][5781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.679 [INFO][5797] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.680 [INFO][5797] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.680 [INFO][5797] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.889 [INFO][5797] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.889 [INFO][5797] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.899 [INFO][5797] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:41.908110 env[1214]: 2025-05-17 00:34:41.905 [INFO][5781] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:34:41.918932 systemd[1]: run-netns-cni\x2d8dc3f820\x2db9f1\x2ddf38\x2d0e4b\x2df3479d4098d9.mount: Deactivated successfully. May 17 00:34:41.926025 env[1214]: time="2025-05-17T00:34:41.925605799Z" level=info msg="TearDown network for sandbox \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" successfully" May 17 00:34:41.926025 env[1214]: time="2025-05-17T00:34:41.925661274Z" level=info msg="StopPodSandbox for \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" returns successfully" May 17 00:34:41.982000 audit[5805]: NETFILTER_CFG table=filter:143 family=2 entries=12 op=nft_register_rule pid=5805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:41.982000 audit[5805]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd7349e300 a2=0 a3=7ffd7349e2ec items=0 ppid=2086 pid=5805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:41.982000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:41.989000 audit[5805]: NETFILTER_CFG table=nat:144 family=2 entries=36 op=nft_register_rule pid=5805 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:41.989000 audit[5805]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd7349e300 a2=0 a3=7ffd7349e2ec items=0 ppid=2086 pid=5805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:41.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:42.048546 kubelet[1967]: I0517 00:34:42.047649 1967 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"kube-api-access-5z998\" (UniqueName: \"kubernetes.io/projected/880e53bc-71af-47ea-ad2d-ce9dfe939fad-kube-api-access-5z998\") pod \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\" (UID: \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\") " May 17 00:34:42.048546 kubelet[1967]: I0517 00:34:42.047712 1967 reconciler_common.go:162] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/880e53bc-71af-47ea-ad2d-ce9dfe939fad-calico-apiserver-certs\") pod \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\" (UID: \"880e53bc-71af-47ea-ad2d-ce9dfe939fad\") " May 17 00:34:42.076101 systemd[1]: var-lib-kubelet-pods-880e53bc\x2d71af\x2d47ea\x2dad2d\x2dce9dfe939fad-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 17 00:34:42.078010 kubelet[1967]: I0517 00:34:42.076630 1967 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/880e53bc-71af-47ea-ad2d-ce9dfe939fad-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "880e53bc-71af-47ea-ad2d-ce9dfe939fad" (UID: "880e53bc-71af-47ea-ad2d-ce9dfe939fad"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGIDValue "" May 17 00:34:42.079097 kubelet[1967]: I0517 00:34:42.078218 1967 operation_generator.go:781] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/880e53bc-71af-47ea-ad2d-ce9dfe939fad-kube-api-access-5z998" (OuterVolumeSpecName: "kube-api-access-5z998") pod "880e53bc-71af-47ea-ad2d-ce9dfe939fad" (UID: "880e53bc-71af-47ea-ad2d-ce9dfe939fad"). InnerVolumeSpecName "kube-api-access-5z998". PluginName "kubernetes.io/projected", VolumeGIDValue "" May 17 00:34:42.085513 systemd[1]: var-lib-kubelet-pods-880e53bc\x2d71af\x2d47ea\x2dad2d\x2dce9dfe939fad-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d5z998.mount: Deactivated successfully. May 17 00:34:42.150479 kubelet[1967]: I0517 00:34:42.150406 1967 reconciler_common.go:299] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/880e53bc-71af-47ea-ad2d-ce9dfe939fad-calico-apiserver-certs\") on node \"localhost\" DevicePath \"\"" May 17 00:34:42.150479 kubelet[1967]: I0517 00:34:42.150453 1967 reconciler_common.go:299] "Volume detached for volume \"kube-api-access-5z998\" (UniqueName: \"kubernetes.io/projected/880e53bc-71af-47ea-ad2d-ce9dfe939fad-kube-api-access-5z998\") on node \"localhost\" DevicePath \"\"" May 17 00:34:42.658898 systemd[1]: Removed slice kubepods-besteffort-pod880e53bc_71af_47ea_ad2d_ce9dfe939fad.slice. May 17 00:34:42.659044 systemd[1]: kubepods-besteffort-pod880e53bc_71af_47ea_ad2d_ce9dfe939fad.slice: Consumed 1.042s CPU time. May 17 00:34:43.121385 systemd[1]: Started sshd@18-10.0.0.66:22-10.0.0.1:35148.service. May 17 00:34:43.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.66:22-10.0.0.1:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:43.123072 kernel: kauditd_printk_skb: 29 callbacks suppressed May 17 00:34:43.123357 kernel: audit: type=1130 audit(1747442083.120:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.66:22-10.0.0.1:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:43.225392 sshd[5809]: Accepted publickey for core from 10.0.0.1 port 35148 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:43.224000 audit[5809]: USER_ACCT pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.246808 kernel: audit: type=1101 audit(1747442083.224:1558): pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.249542 kernel: audit: type=1103 audit(1747442083.237:1559): pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.251103 kernel: audit: type=1006 audit(1747442083.237:1560): pid=5809 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 17 00:34:43.251158 kernel: audit: type=1300 audit(1747442083.237:1560): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3f4c5dc0 a2=3 a3=0 items=0 ppid=1 pid=5809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:43.237000 audit[5809]: CRED_ACQ pid=5809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.237000 audit[5809]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3f4c5dc0 a2=3 a3=0 items=0 ppid=1 pid=5809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:43.239283 sshd[5809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:43.255080 kernel: audit: type=1327 audit(1747442083.237:1560): proctitle=737368643A20636F7265205B707269765D May 17 00:34:43.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:43.267599 systemd-logind[1203]: New session 19 of user core. May 17 00:34:43.268016 systemd[1]: Started session-19.scope. May 17 00:34:43.307000 audit[5809]: USER_START pid=5809 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.316000 audit[5811]: CRED_ACQ pid=5811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.324241 kernel: audit: type=1105 audit(1747442083.307:1561): pid=5809 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.324417 kernel: audit: type=1103 audit(1747442083.316:1562): pid=5811 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.514270 kubelet[1967]: I0517 00:34:43.513302 1967 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="880e53bc-71af-47ea-ad2d-ce9dfe939fad" path="/var/lib/kubelet/pods/880e53bc-71af-47ea-ad2d-ce9dfe939fad/volumes" May 17 00:34:43.701506 sshd[5809]: pam_unix(sshd:session): session closed for user core May 17 00:34:43.703000 audit[5809]: USER_END pid=5809 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.707207 systemd[1]: sshd@18-10.0.0.66:22-10.0.0.1:35148.service: Deactivated successfully. May 17 00:34:43.708123 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:34:43.703000 audit[5809]: CRED_DISP pid=5809 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.717460 kernel: audit: type=1106 audit(1747442083.703:1563): pid=5809 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.717527 kernel: audit: type=1104 audit(1747442083.703:1564): pid=5809 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.66:22-10.0.0.1:35148 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:43.720336 systemd-logind[1203]: Session 19 logged out. Waiting for processes to exit. May 17 00:34:43.726724 systemd-logind[1203]: Removed session 19. May 17 00:34:48.705982 systemd[1]: Started sshd@19-10.0.0.66:22-10.0.0.1:48872.service. May 17 00:34:48.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.66:22-10.0.0.1:48872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:48.707033 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:34:48.707115 kernel: audit: type=1130 audit(1747442088.704:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.66:22-10.0.0.1:48872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:48.738000 audit[5845]: USER_ACCT pid=5845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.740372 sshd[5845]: Accepted publickey for core from 10.0.0.1 port 48872 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:48.741783 sshd[5845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:48.740000 audit[5845]: CRED_ACQ pid=5845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.746162 systemd-logind[1203]: New session 20 of user core. May 17 00:34:48.747261 systemd[1]: Started session-20.scope. May 17 00:34:48.747868 kernel: audit: type=1101 audit(1747442088.738:1567): pid=5845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.748381 kernel: audit: type=1103 audit(1747442088.740:1568): pid=5845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.748656 kernel: audit: type=1006 audit(1747442088.740:1569): pid=5845 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 17 00:34:48.740000 audit[5845]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe871e0e60 a2=3 a3=0 items=0 ppid=1 pid=5845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:48.754877 kernel: audit: type=1300 audit(1747442088.740:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe871e0e60 a2=3 a3=0 items=0 ppid=1 pid=5845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:48.754944 kernel: audit: type=1327 audit(1747442088.740:1569): proctitle=737368643A20636F7265205B707269765D May 17 00:34:48.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:48.751000 audit[5845]: USER_START pid=5845 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.761292 kernel: audit: type=1105 audit(1747442088.751:1570): pid=5845 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.761359 kernel: audit: type=1103 audit(1747442088.752:1571): pid=5847 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.752000 audit[5847]: CRED_ACQ pid=5847 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.856025 sshd[5845]: pam_unix(sshd:session): session closed for user core May 17 00:34:48.856000 audit[5845]: USER_END pid=5845 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.859470 systemd[1]: sshd@19-10.0.0.66:22-10.0.0.1:48872.service: Deactivated successfully. May 17 00:34:48.860137 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:34:48.860752 systemd-logind[1203]: Session 20 logged out. Waiting for processes to exit. May 17 00:34:48.861920 systemd[1]: Started sshd@20-10.0.0.66:22-10.0.0.1:48888.service. May 17 00:34:48.866276 kernel: audit: type=1106 audit(1747442088.856:1572): pid=5845 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.866399 kernel: audit: type=1104 audit(1747442088.856:1573): pid=5845 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.856000 audit[5845]: CRED_DISP pid=5845 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.863446 systemd-logind[1203]: Removed session 20. May 17 00:34:48.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.66:22-10.0.0.1:48872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:48.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.66:22-10.0.0.1:48888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:48.894000 audit[5858]: USER_ACCT pid=5858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.897262 sshd[5858]: Accepted publickey for core from 10.0.0.1 port 48888 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:48.896000 audit[5858]: CRED_ACQ pid=5858 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.896000 audit[5858]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb1b4acf0 a2=3 a3=0 items=0 ppid=1 pid=5858 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:48.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:48.898328 sshd[5858]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:48.902740 systemd-logind[1203]: New session 21 of user core. May 17 00:34:48.903362 systemd[1]: Started session-21.scope. May 17 00:34:48.907000 audit[5858]: USER_START pid=5858 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:48.909000 audit[5860]: CRED_ACQ pid=5860 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:50.252460 sshd[5858]: pam_unix(sshd:session): session closed for user core May 17 00:34:50.252000 audit[5858]: USER_END pid=5858 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:50.252000 audit[5858]: CRED_DISP pid=5858 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:50.257719 systemd[1]: Started sshd@21-10.0.0.66:22-10.0.0.1:48894.service. May 17 00:34:50.258397 systemd[1]: sshd@20-10.0.0.66:22-10.0.0.1:48888.service: Deactivated successfully. May 17 00:34:50.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.66:22-10.0.0.1:48894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:50.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.66:22-10.0.0.1:48888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:50.259572 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:34:50.260357 systemd-logind[1203]: Session 21 logged out. Waiting for processes to exit. May 17 00:34:50.261378 systemd-logind[1203]: Removed session 21. May 17 00:34:50.295000 audit[5869]: USER_ACCT pid=5869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:50.297166 sshd[5869]: Accepted publickey for core from 10.0.0.1 port 48894 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:50.296000 audit[5869]: CRED_ACQ pid=5869 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:50.296000 audit[5869]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1641e710 a2=3 a3=0 items=0 ppid=1 pid=5869 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:50.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:50.298446 sshd[5869]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:50.302893 systemd-logind[1203]: New session 22 of user core. May 17 00:34:50.303959 systemd[1]: Started session-22.scope. May 17 00:34:50.307000 audit[5869]: USER_START pid=5869 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:50.309000 audit[5872]: CRED_ACQ pid=5872 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.350000 audit[5897]: NETFILTER_CFG table=filter:145 family=2 entries=24 op=nft_register_rule pid=5897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:51.350000 audit[5897]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffd0978ce00 a2=0 a3=7ffd0978cdec items=0 ppid=2086 pid=5897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:51.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:51.358000 audit[5897]: NETFILTER_CFG table=nat:146 family=2 entries=22 op=nft_register_rule pid=5897 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:51.358000 audit[5897]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd0978ce00 a2=0 a3=0 items=0 ppid=2086 pid=5897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:51.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:51.373088 sshd[5869]: pam_unix(sshd:session): session closed for user core May 17 00:34:51.373000 audit[5869]: USER_END pid=5869 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.373000 audit[5869]: CRED_DISP pid=5869 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.66:22-10.0.0.1:48894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:51.376466 systemd[1]: sshd@21-10.0.0.66:22-10.0.0.1:48894.service: Deactivated successfully. May 17 00:34:51.376985 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:34:51.377990 systemd-logind[1203]: Session 22 logged out. Waiting for processes to exit. May 17 00:34:51.379528 systemd[1]: Started sshd@22-10.0.0.66:22-10.0.0.1:48896.service. May 17 00:34:51.381141 systemd-logind[1203]: Removed session 22. May 17 00:34:51.378000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.66:22-10.0.0.1:48896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:51.378000 audit[5901]: NETFILTER_CFG table=filter:147 family=2 entries=36 op=nft_register_rule pid=5901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:51.378000 audit[5901]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7ffc50518ea0 a2=0 a3=7ffc50518e8c items=0 ppid=2086 pid=5901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:51.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:51.383000 audit[5901]: NETFILTER_CFG table=nat:148 family=2 entries=22 op=nft_register_rule pid=5901 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:51.383000 audit[5901]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc50518ea0 a2=0 a3=0 items=0 ppid=2086 pid=5901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:51.383000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:51.413000 audit[5902]: USER_ACCT pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.415107 sshd[5902]: Accepted publickey for core from 10.0.0.1 port 48896 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:51.414000 audit[5902]: CRED_ACQ pid=5902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.414000 audit[5902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbc010b60 a2=3 a3=0 items=0 ppid=1 pid=5902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:51.414000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:51.416313 sshd[5902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:51.420626 systemd-logind[1203]: New session 23 of user core. May 17 00:34:51.421518 systemd[1]: Started session-23.scope. May 17 00:34:51.425000 audit[5902]: USER_START pid=5902 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.426000 audit[5904]: CRED_ACQ pid=5904 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.976895 sshd[5902]: pam_unix(sshd:session): session closed for user core May 17 00:34:51.976000 audit[5902]: USER_END pid=5902 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.976000 audit[5902]: CRED_DISP pid=5902 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:51.980434 systemd[1]: sshd@22-10.0.0.66:22-10.0.0.1:48896.service: Deactivated successfully. May 17 00:34:51.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.66:22-10.0.0.1:48896 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:51.981062 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:34:51.981796 systemd-logind[1203]: Session 23 logged out. Waiting for processes to exit. May 17 00:34:51.983409 systemd[1]: Started sshd@23-10.0.0.66:22-10.0.0.1:48904.service. May 17 00:34:51.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.66:22-10.0.0.1:48904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:51.984776 systemd-logind[1203]: Removed session 23. May 17 00:34:52.015000 audit[5915]: USER_ACCT pid=5915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:52.016928 sshd[5915]: Accepted publickey for core from 10.0.0.1 port 48904 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:52.016000 audit[5915]: CRED_ACQ pid=5915 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:52.016000 audit[5915]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc58d11fa0 a2=3 a3=0 items=0 ppid=1 pid=5915 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:52.016000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:52.018330 sshd[5915]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:52.021965 systemd-logind[1203]: New session 24 of user core. May 17 00:34:52.022726 systemd[1]: Started session-24.scope. May 17 00:34:52.025000 audit[5915]: USER_START pid=5915 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:52.026000 audit[5917]: CRED_ACQ pid=5917 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:52.234650 sshd[5915]: pam_unix(sshd:session): session closed for user core May 17 00:34:52.234000 audit[5915]: USER_END pid=5915 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:52.234000 audit[5915]: CRED_DISP pid=5915 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:52.237613 systemd[1]: sshd@23-10.0.0.66:22-10.0.0.1:48904.service: Deactivated successfully. May 17 00:34:52.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.66:22-10.0.0.1:48904 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:52.238501 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:34:52.239172 systemd-logind[1203]: Session 24 logged out. Waiting for processes to exit. May 17 00:34:52.240058 systemd-logind[1203]: Removed session 24. May 17 00:34:56.512168 env[1214]: time="2025-05-17T00:34:56.511799449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:34:56.905194 env[1214]: time="2025-05-17T00:34:56.905109479Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:56.906381 env[1214]: time="2025-05-17T00:34:56.906347662Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:56.906639 kubelet[1967]: E0517 00:34:56.906586 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:56.906950 kubelet[1967]: E0517 00:34:56.906646 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:56.906950 kubelet[1967]: E0517 00:34:56.906920 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:70e935a2e96d40cfaa78ad64750c7ee6,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-lb74r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6c65d694b6-2xhfb_calico-system(7614d727-5145-486e-8d21-b867c95fe30e): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:56.907104 env[1214]: time="2025-05-17T00:34:56.906967350Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:34:57.153903 env[1214]: time="2025-05-17T00:34:57.153830801Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:57.155517 env[1214]: time="2025-05-17T00:34:57.155401712Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:57.156151 kubelet[1967]: E0517 00:34:57.155709 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:57.156151 kubelet[1967]: E0517 00:34:57.155770 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:57.156266 env[1214]: time="2025-05-17T00:34:57.156145779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:34:57.156340 kubelet[1967]: E0517 00:34:57.156262 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-5xqs8,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-78d55f7ddc-vhb9n_calico-system(6355ee6b-a9d4-44f9-9931-2ea96bcf14a7): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:57.157785 kubelet[1967]: E0517 00:34:57.157727 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:34:57.239204 systemd[1]: Started sshd@24-10.0.0.66:22-10.0.0.1:47314.service. May 17 00:34:57.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.66:22-10.0.0.1:47314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:57.240707 kernel: kauditd_printk_skb: 57 callbacks suppressed May 17 00:34:57.240784 kernel: audit: type=1130 audit(1747442097.238:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.66:22-10.0.0.1:47314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:57.283000 audit[5930]: USER_ACCT pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.289541 sshd[5930]: Accepted publickey for core from 10.0.0.1 port 47314 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:34:57.289774 sshd[5930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:57.288000 audit[5930]: CRED_ACQ pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.294202 kernel: audit: type=1101 audit(1747442097.283:1616): pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.294277 kernel: audit: type=1103 audit(1747442097.288:1617): pid=5930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.296404 systemd[1]: Started session-25.scope. May 17 00:34:57.296924 kernel: audit: type=1006 audit(1747442097.288:1618): pid=5930 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:34:57.296980 kernel: audit: type=1300 audit(1747442097.288:1618): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd49703700 a2=3 a3=0 items=0 ppid=1 pid=5930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.288000 audit[5930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd49703700 a2=3 a3=0 items=0 ppid=1 pid=5930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:57.296831 systemd-logind[1203]: New session 25 of user core. May 17 00:34:57.303724 kernel: audit: type=1327 audit(1747442097.288:1618): proctitle=737368643A20636F7265205B707269765D May 17 00:34:57.288000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:57.300000 audit[5930]: USER_START pid=5930 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.309213 kernel: audit: type=1105 audit(1747442097.300:1619): pid=5930 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.309302 kernel: audit: type=1103 audit(1747442097.302:1620): pid=5932 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.302000 audit[5932]: CRED_ACQ pid=5932 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.378865 env[1214]: time="2025-05-17T00:34:57.378791109Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:57.380468 env[1214]: time="2025-05-17T00:34:57.380426806Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:57.380748 kubelet[1967]: E0517 00:34:57.380703 1967 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:57.380867 kubelet[1967]: E0517 00:34:57.380842 1967 kuberuntime_image.go:42] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:57.381096 kubelet[1967]: E0517 00:34:57.381054 1967 kuberuntime_manager.go:1358] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-lb74r,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-6c65d694b6-2xhfb_calico-system(7614d727-5145-486e-8d21-b867c95fe30e): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:57.382780 kubelet[1967]: E0517 00:34:57.382749 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6c65d694b6-2xhfb" podUID="7614d727-5145-486e-8d21-b867c95fe30e" May 17 00:34:57.474385 sshd[5930]: pam_unix(sshd:session): session closed for user core May 17 00:34:57.474000 audit[5930]: USER_END pid=5930 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.476830 systemd[1]: sshd@24-10.0.0.66:22-10.0.0.1:47314.service: Deactivated successfully. May 17 00:34:57.477642 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:34:57.478146 systemd-logind[1203]: Session 25 logged out. Waiting for processes to exit. May 17 00:34:57.478992 systemd-logind[1203]: Removed session 25. May 17 00:34:57.474000 audit[5930]: CRED_DISP pid=5930 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.484393 kernel: audit: type=1106 audit(1747442097.474:1621): pid=5930 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.484442 kernel: audit: type=1104 audit(1747442097.474:1622): pid=5930 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:57.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.66:22-10.0.0.1:47314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:58.510237 kubelet[1967]: E0517 00:34:58.510165 1967 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:35:02.479220 systemd[1]: Started sshd@25-10.0.0.66:22-10.0.0.1:47330.service. May 17 00:35:02.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.66:22-10.0.0.1:47330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:02.541940 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:35:02.542024 kernel: audit: type=1130 audit(1747442102.479:1624): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.66:22-10.0.0.1:47330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:02.575000 audit[5969]: USER_ACCT pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.576545 sshd[5969]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:02.593258 sshd[5969]: Accepted publickey for core from 10.0.0.1 port 47330 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:35:02.597214 systemd[1]: Started session-26.scope. May 17 00:35:02.602347 kernel: audit: type=1101 audit(1747442102.575:1625): pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.602505 kernel: audit: type=1103 audit(1747442102.576:1626): pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.576000 audit[5969]: CRED_ACQ pid=5969 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.598249 systemd-logind[1203]: New session 26 of user core. May 17 00:35:02.605627 kernel: audit: type=1006 audit(1747442102.576:1627): pid=5969 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 17 00:35:02.576000 audit[5969]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde2f87ef0 a2=3 a3=0 items=0 ppid=1 pid=5969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.610112 kernel: audit: type=1300 audit(1747442102.576:1627): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde2f87ef0 a2=3 a3=0 items=0 ppid=1 pid=5969 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:02.610322 kernel: audit: type=1327 audit(1747442102.576:1627): proctitle=737368643A20636F7265205B707269765D May 17 00:35:02.576000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:02.603000 audit[5969]: USER_START pid=5969 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.616300 kernel: audit: type=1105 audit(1747442102.603:1628): pid=5969 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.616337 kernel: audit: type=1103 audit(1747442102.604:1629): pid=5971 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.604000 audit[5971]: CRED_ACQ pid=5971 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.831432 sshd[5969]: pam_unix(sshd:session): session closed for user core May 17 00:35:02.832000 audit[5969]: USER_END pid=5969 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.833589 systemd[1]: sshd@25-10.0.0.66:22-10.0.0.1:47330.service: Deactivated successfully. May 17 00:35:02.834432 systemd[1]: session-26.scope: Deactivated successfully. May 17 00:35:02.835110 systemd-logind[1203]: Session 26 logged out. Waiting for processes to exit. May 17 00:35:02.835918 systemd-logind[1203]: Removed session 26. May 17 00:35:02.832000 audit[5969]: CRED_DISP pid=5969 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.840265 kernel: audit: type=1106 audit(1747442102.832:1630): pid=5969 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.840317 kernel: audit: type=1104 audit(1747442102.832:1631): pid=5969 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:02.833000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.66:22-10.0.0.1:47330 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:06.962000 audit[5982]: NETFILTER_CFG table=filter:149 family=2 entries=24 op=nft_register_rule pid=5982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:06.962000 audit[5982]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fffc8acd600 a2=0 a3=7fffc8acd5ec items=0 ppid=2086 pid=5982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:06.962000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:06.968000 audit[5982]: NETFILTER_CFG table=nat:150 family=2 entries=106 op=nft_register_chain pid=5982 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:35:06.968000 audit[5982]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffc8acd600 a2=0 a3=7fffc8acd5ec items=0 ppid=2086 pid=5982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:06.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:35:07.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.66:22-10.0.0.1:59604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:07.837716 systemd[1]: Started sshd@26-10.0.0.66:22-10.0.0.1:59604.service. May 17 00:35:07.839114 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:35:07.839745 kernel: audit: type=1130 audit(1747442107.836:1635): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.66:22-10.0.0.1:59604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:07.891000 audit[5984]: USER_ACCT pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:07.898052 sshd[5984]: Accepted publickey for core from 10.0.0.1 port 59604 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:35:07.898396 kernel: audit: type=1101 audit(1747442107.891:1636): pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:07.898439 kernel: audit: type=1103 audit(1747442107.896:1637): pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:07.896000 audit[5984]: CRED_ACQ pid=5984 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:07.903297 sshd[5984]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:07.896000 audit[5984]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea6937f00 a2=3 a3=0 items=0 ppid=1 pid=5984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.912254 kernel: audit: type=1006 audit(1747442107.896:1638): pid=5984 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 17 00:35:07.912322 kernel: audit: type=1300 audit(1747442107.896:1638): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffea6937f00 a2=3 a3=0 items=0 ppid=1 pid=5984 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:07.896000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:07.914959 kernel: audit: type=1327 audit(1747442107.896:1638): proctitle=737368643A20636F7265205B707269765D May 17 00:35:07.917675 systemd-logind[1203]: New session 27 of user core. May 17 00:35:07.919273 systemd[1]: Started session-27.scope. May 17 00:35:07.924000 audit[5984]: USER_START pid=5984 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:07.938003 kernel: audit: type=1105 audit(1747442107.924:1639): pid=5984 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:07.938201 kernel: audit: type=1103 audit(1747442107.926:1640): pid=5986 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:07.926000 audit[5986]: CRED_ACQ pid=5986 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:08.109841 sshd[5984]: pam_unix(sshd:session): session closed for user core May 17 00:35:08.111000 audit[5984]: USER_END pid=5984 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:08.121326 kernel: audit: type=1106 audit(1747442108.111:1641): pid=5984 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:08.121475 kernel: audit: type=1104 audit(1747442108.112:1642): pid=5984 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:08.112000 audit[5984]: CRED_DISP pid=5984 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:08.117932 systemd[1]: sshd@26-10.0.0.66:22-10.0.0.1:59604.service: Deactivated successfully. May 17 00:35:08.118946 systemd[1]: session-27.scope: Deactivated successfully. May 17 00:35:08.120335 systemd-logind[1203]: Session 27 logged out. Waiting for processes to exit. May 17 00:35:08.121404 systemd-logind[1203]: Removed session 27. May 17 00:35:08.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.66:22-10.0.0.1:59604 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:10.510998 kubelet[1967]: E0517 00:35:10.510946 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-6c65d694b6-2xhfb" podUID="7614d727-5145-486e-8d21-b867c95fe30e" May 17 00:35:12.509997 kubelet[1967]: E0517 00:35:12.509943 1967 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": ErrImagePull: failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-78d55f7ddc-vhb9n" podUID="6355ee6b-a9d4-44f9-9931-2ea96bcf14a7" May 17 00:35:13.115589 systemd[1]: Started sshd@27-10.0.0.66:22-10.0.0.1:59608.service. May 17 00:35:13.121224 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:35:13.121400 kernel: audit: type=1130 audit(1747442113.114:1644): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.66:22-10.0.0.1:59608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.66:22-10.0.0.1:59608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:13.153000 audit[5998]: USER_ACCT pid=5998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.155788 sshd[5998]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:13.158637 sshd[5998]: Accepted publickey for core from 10.0.0.1 port 59608 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:35:13.154000 audit[5998]: CRED_ACQ pid=5998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.159881 systemd-logind[1203]: New session 28 of user core. May 17 00:35:13.163565 kernel: audit: type=1101 audit(1747442113.153:1645): pid=5998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.163601 kernel: audit: type=1103 audit(1747442113.154:1646): pid=5998 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.163626 kernel: audit: type=1006 audit(1747442113.154:1647): pid=5998 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 17 00:35:13.160661 systemd[1]: Started session-28.scope. May 17 00:35:13.154000 audit[5998]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c0fd880 a2=3 a3=0 items=0 ppid=1 pid=5998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:13.171214 kernel: audit: type=1300 audit(1747442113.154:1647): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0c0fd880 a2=3 a3=0 items=0 ppid=1 pid=5998 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:13.171269 kernel: audit: type=1327 audit(1747442113.154:1647): proctitle=737368643A20636F7265205B707269765D May 17 00:35:13.154000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:13.164000 audit[5998]: USER_START pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.177782 kernel: audit: type=1105 audit(1747442113.164:1648): pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.177825 kernel: audit: type=1103 audit(1747442113.165:1649): pid=6000 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.165000 audit[6000]: CRED_ACQ pid=6000 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.278916 sshd[5998]: pam_unix(sshd:session): session closed for user core May 17 00:35:13.278000 audit[5998]: USER_END pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.281669 systemd[1]: sshd@27-10.0.0.66:22-10.0.0.1:59608.service: Deactivated successfully. May 17 00:35:13.282489 systemd[1]: session-28.scope: Deactivated successfully. May 17 00:35:13.283097 systemd-logind[1203]: Session 28 logged out. Waiting for processes to exit. May 17 00:35:13.283942 systemd-logind[1203]: Removed session 28. May 17 00:35:13.278000 audit[5998]: CRED_DISP pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.288548 kernel: audit: type=1106 audit(1747442113.278:1650): pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.288620 kernel: audit: type=1104 audit(1747442113.278:1651): pid=5998 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:13.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.66:22-10.0.0.1:59608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:14.342000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=5204 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.342000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.342000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00ee7f530 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:35:14.342000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c0114b9aa0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:35:14.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:35:14.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:35:14.342000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.342000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c013dc54e0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:35:14.342000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:35:14.350000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.350000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c01340a220 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:35:14.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:35:14.350000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.350000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=82 a1=c004b51ef0 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:35:14.350000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:35:14.353000 audit[1819]: AVC avc: denied { watch } for pid=1819 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=5210 scontext=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.353000 audit[1819]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c013254030 a2=fc6 a3=0 items=0 ppid=1676 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c48,c675 key=(null) May 17 00:35:14.353000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3636002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:35:14.562000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=5202 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.562000 audit[1803]: AVC avc: denied { watch } for pid=1803 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=5208 scontext=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:35:14.562000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0025d1dd0 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:35:14.562000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:14.562000 audit[1803]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00042b940 a2=fc6 a3=0 items=0 ppid=1661 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c219,c723 key=(null) May 17 00:35:14.562000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:35:14.595000 audit[4712]: AVC avc: denied { watch } for pid=4712 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_33_48.2288992769/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c392,c701 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c392,c701 tclass=file permissive=0 May 17 00:35:14.595000 audit[4712]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c002ef0880 a2=fc6 a3=0 items=0 ppid=4129 pid=4712 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c392,c701 key=(null) May 17 00:35:14.595000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:35:18.285038 systemd[1]: Started sshd@28-10.0.0.66:22-10.0.0.1:50458.service. May 17 00:35:18.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.66:22-10.0.0.1:50458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.289915 kernel: kauditd_printk_skb: 28 callbacks suppressed May 17 00:35:18.289995 kernel: audit: type=1130 audit(1747442118.284:1662): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.66:22-10.0.0.1:50458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:18.323000 audit[6033]: USER_ACCT pid=6033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.325564 sshd[6033]: Accepted publickey for core from 10.0.0.1 port 50458 ssh2: RSA SHA256:zHGb6zFE5uWTPnbfHFhmjGeDUJxvuwQSpK8sihWDiq0 May 17 00:35:18.328777 sshd[6033]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:35:18.327000 audit[6033]: CRED_ACQ pid=6033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.339110 kernel: audit: type=1101 audit(1747442118.323:1663): pid=6033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.339229 kernel: audit: type=1103 audit(1747442118.327:1664): pid=6033 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.339254 kernel: audit: type=1006 audit(1747442118.327:1665): pid=6033 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 May 17 00:35:18.339281 kernel: audit: type=1300 audit(1747442118.327:1665): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb32c7f40 a2=3 a3=0 items=0 ppid=1 pid=6033 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.327000 audit[6033]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb32c7f40 a2=3 a3=0 items=0 ppid=1 pid=6033 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:35:18.333697 systemd-logind[1203]: New session 29 of user core. May 17 00:35:18.333812 systemd[1]: Started session-29.scope. May 17 00:35:18.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:35:18.338000 audit[6033]: USER_START pid=6033 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.345869 kernel: audit: type=1327 audit(1747442118.327:1665): proctitle=737368643A20636F7265205B707269765D May 17 00:35:18.345972 kernel: audit: type=1105 audit(1747442118.338:1666): pid=6033 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.346047 kernel: audit: type=1103 audit(1747442118.339:1667): pid=6036 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.339000 audit[6036]: CRED_ACQ pid=6036 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.473739 sshd[6033]: pam_unix(sshd:session): session closed for user core May 17 00:35:18.473000 audit[6033]: USER_END pid=6033 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.475846 systemd[1]: sshd@28-10.0.0.66:22-10.0.0.1:50458.service: Deactivated successfully. May 17 00:35:18.476821 systemd[1]: session-29.scope: Deactivated successfully. May 17 00:35:18.477696 systemd-logind[1203]: Session 29 logged out. Waiting for processes to exit. May 17 00:35:18.478610 systemd-logind[1203]: Removed session 29. May 17 00:35:18.473000 audit[6033]: CRED_DISP pid=6033 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.487699 kernel: audit: type=1106 audit(1747442118.473:1668): pid=6033 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.487762 kernel: audit: type=1104 audit(1747442118.473:1669): pid=6033 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:35:18.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.66:22-10.0.0.1:50458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:35:19.375928 kubelet[1967]: I0517 00:35:19.375893 1967 scope.go:117] "RemoveContainer" containerID="8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f" May 17 00:35:19.376880 env[1214]: time="2025-05-17T00:35:19.376847015Z" level=info msg="RemoveContainer for \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\"" May 17 00:35:19.442284 env[1214]: time="2025-05-17T00:35:19.442239243Z" level=info msg="RemoveContainer for \"8d0c9b31b54408dc3295adb82045df3bc23e7f71454b489de812c8fc6a3b491f\" returns successfully" May 17 00:35:19.443790 env[1214]: time="2025-05-17T00:35:19.443759954Z" level=info msg="StopPodSandbox for \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\"" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.918 [WARNING][6058] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.918 [INFO][6058] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.918 [INFO][6058] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" iface="eth0" netns="" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.918 [INFO][6058] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.918 [INFO][6058] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.958 [INFO][6067] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.959 [INFO][6067] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.959 [INFO][6067] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.967 [WARNING][6067] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.967 [INFO][6067] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.969 [INFO][6067] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:19.972920 env[1214]: 2025-05-17 00:35:19.971 [INFO][6058] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:19.973752 env[1214]: time="2025-05-17T00:35:19.972921540Z" level=info msg="TearDown network for sandbox \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" successfully" May 17 00:35:19.973752 env[1214]: time="2025-05-17T00:35:19.972955676Z" level=info msg="StopPodSandbox for \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" returns successfully" May 17 00:35:19.973752 env[1214]: time="2025-05-17T00:35:19.973597567Z" level=info msg="RemovePodSandbox for \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\"" May 17 00:35:19.973752 env[1214]: time="2025-05-17T00:35:19.973627074Z" level=info msg="Forcibly stopping sandbox \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\"" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.004 [WARNING][6085] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" WorkloadEndpoint="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.004 [INFO][6085] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.004 [INFO][6085] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" iface="eth0" netns="" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.004 [INFO][6085] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.004 [INFO][6085] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.025 [INFO][6094] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.026 [INFO][6094] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.026 [INFO][6094] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.032 [WARNING][6094] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.032 [INFO][6094] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" HandleID="k8s-pod-network.0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" Workload="localhost-k8s-calico--apiserver--84df797bd4--hhlmn-eth0" May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.034 [INFO][6094] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:35:20.037956 env[1214]: 2025-05-17 00:35:20.036 [INFO][6085] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5" May 17 00:35:20.038404 env[1214]: time="2025-05-17T00:35:20.037975122Z" level=info msg="TearDown network for sandbox \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" successfully" May 17 00:35:20.045604 env[1214]: time="2025-05-17T00:35:20.045560283Z" level=info msg="RemovePodSandbox \"0f6ba1582c72bcae90e3c878238e9563feabd7c5817c1f089e4f0eac64bbf4d5\" returns successfully"