May 17 00:32:41.829759 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 16 23:09:52 -00 2025 May 17 00:32:41.829777 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:32:41.829787 kernel: BIOS-provided physical RAM map: May 17 00:32:41.829792 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:32:41.829798 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 17 00:32:41.829803 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 17 00:32:41.829810 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 17 00:32:41.829816 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 17 00:32:41.829821 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 17 00:32:41.829828 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 17 00:32:41.829834 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 17 00:32:41.829839 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 17 00:32:41.829845 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 17 00:32:41.829850 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 17 00:32:41.829857 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 17 00:32:41.829865 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 17 00:32:41.829871 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 17 00:32:41.829876 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 17 00:32:41.829882 kernel: NX (Execute Disable) protection: active May 17 00:32:41.829888 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 17 00:32:41.829894 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 17 00:32:41.829900 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 17 00:32:41.829906 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 17 00:32:41.829912 kernel: extended physical RAM map: May 17 00:32:41.829918 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 17 00:32:41.829925 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 17 00:32:41.829931 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 17 00:32:41.829946 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 17 00:32:41.829954 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 17 00:32:41.829962 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 17 00:32:41.829970 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 17 00:32:41.829977 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 17 00:32:41.829985 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 17 00:32:41.829993 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 17 00:32:41.830001 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 17 00:32:41.830007 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 17 00:32:41.830015 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 17 00:32:41.830052 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 17 00:32:41.830058 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 17 00:32:41.830064 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 17 00:32:41.830073 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 17 00:32:41.830080 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 17 00:32:41.830086 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 17 00:32:41.830094 kernel: efi: EFI v2.70 by EDK II May 17 00:32:41.830100 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 17 00:32:41.830107 kernel: random: crng init done May 17 00:32:41.830113 kernel: SMBIOS 2.8 present. May 17 00:32:41.830120 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 17 00:32:41.830126 kernel: Hypervisor detected: KVM May 17 00:32:41.830133 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 17 00:32:41.830139 kernel: kvm-clock: cpu 0, msr 4b19a001, primary cpu clock May 17 00:32:41.830146 kernel: kvm-clock: using sched offset of 3985037701 cycles May 17 00:32:41.830154 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 17 00:32:41.830161 kernel: tsc: Detected 2794.746 MHz processor May 17 00:32:41.830167 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 17 00:32:41.830174 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 17 00:32:41.830181 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 17 00:32:41.830187 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 17 00:32:41.830194 kernel: Using GB pages for direct mapping May 17 00:32:41.830200 kernel: Secure boot disabled May 17 00:32:41.830207 kernel: ACPI: Early table checksum verification disabled May 17 00:32:41.830215 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 17 00:32:41.830221 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 17 00:32:41.830228 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:41.830234 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:41.830241 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 17 00:32:41.830247 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:41.830254 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:41.830261 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:41.830267 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 17 00:32:41.830275 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 17 00:32:41.830281 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 17 00:32:41.830288 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 17 00:32:41.830295 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 17 00:32:41.830301 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 17 00:32:41.830308 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 17 00:32:41.830314 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 17 00:32:41.830321 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 17 00:32:41.830327 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 17 00:32:41.830335 kernel: No NUMA configuration found May 17 00:32:41.830341 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 17 00:32:41.830348 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 17 00:32:41.830354 kernel: Zone ranges: May 17 00:32:41.830361 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 17 00:32:41.830367 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 17 00:32:41.830374 kernel: Normal empty May 17 00:32:41.830380 kernel: Movable zone start for each node May 17 00:32:41.830386 kernel: Early memory node ranges May 17 00:32:41.830394 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 17 00:32:41.830401 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 17 00:32:41.830407 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 17 00:32:41.830414 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 17 00:32:41.830420 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 17 00:32:41.830427 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 17 00:32:41.830433 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 17 00:32:41.830440 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:32:41.830446 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 17 00:32:41.830453 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 17 00:32:41.830460 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 17 00:32:41.830467 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 17 00:32:41.830474 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 17 00:32:41.830481 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 17 00:32:41.830487 kernel: ACPI: PM-Timer IO Port: 0x608 May 17 00:32:41.830494 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 17 00:32:41.830500 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 17 00:32:41.830507 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 17 00:32:41.830513 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 17 00:32:41.830521 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 17 00:32:41.830528 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 17 00:32:41.830534 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 17 00:32:41.830541 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 17 00:32:41.830547 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 17 00:32:41.830554 kernel: TSC deadline timer available May 17 00:32:41.830560 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 17 00:32:41.830567 kernel: kvm-guest: KVM setup pv remote TLB flush May 17 00:32:41.830573 kernel: kvm-guest: setup PV sched yield May 17 00:32:41.830581 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 17 00:32:41.830588 kernel: Booting paravirtualized kernel on KVM May 17 00:32:41.830599 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 17 00:32:41.830607 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 17 00:32:41.830614 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 17 00:32:41.830621 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 17 00:32:41.830627 kernel: pcpu-alloc: [0] 0 1 2 3 May 17 00:32:41.830634 kernel: kvm-guest: setup async PF for cpu 0 May 17 00:32:41.830641 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 17 00:32:41.830648 kernel: kvm-guest: PV spinlocks enabled May 17 00:32:41.830655 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 17 00:32:41.830662 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 17 00:32:41.830670 kernel: Policy zone: DMA32 May 17 00:32:41.830678 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:32:41.830685 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 17 00:32:41.830692 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 17 00:32:41.830700 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 17 00:32:41.830707 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 17 00:32:41.830714 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 169308K reserved, 0K cma-reserved) May 17 00:32:41.830721 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 17 00:32:41.830728 kernel: ftrace: allocating 34585 entries in 136 pages May 17 00:32:41.830735 kernel: ftrace: allocated 136 pages with 2 groups May 17 00:32:41.830742 kernel: rcu: Hierarchical RCU implementation. May 17 00:32:41.830749 kernel: rcu: RCU event tracing is enabled. May 17 00:32:41.830756 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 17 00:32:41.830764 kernel: Rude variant of Tasks RCU enabled. May 17 00:32:41.830771 kernel: Tracing variant of Tasks RCU enabled. May 17 00:32:41.830778 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 17 00:32:41.830785 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 17 00:32:41.830792 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 17 00:32:41.830799 kernel: Console: colour dummy device 80x25 May 17 00:32:41.830806 kernel: printk: console [ttyS0] enabled May 17 00:32:41.830812 kernel: ACPI: Core revision 20210730 May 17 00:32:41.830819 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 17 00:32:41.830827 kernel: APIC: Switch to symmetric I/O mode setup May 17 00:32:41.830834 kernel: x2apic enabled May 17 00:32:41.830841 kernel: Switched APIC routing to physical x2apic. May 17 00:32:41.830848 kernel: kvm-guest: setup PV IPIs May 17 00:32:41.830855 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 17 00:32:41.830862 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 17 00:32:41.830868 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794746) May 17 00:32:41.830875 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 17 00:32:41.830882 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 17 00:32:41.830890 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 17 00:32:41.830897 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 17 00:32:41.830904 kernel: Spectre V2 : Mitigation: Retpolines May 17 00:32:41.830911 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 17 00:32:41.830918 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 17 00:32:41.830924 kernel: RETBleed: Mitigation: untrained return thunk May 17 00:32:41.830931 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 17 00:32:41.830947 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 17 00:32:41.830956 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 17 00:32:41.830967 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 17 00:32:41.830976 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 17 00:32:41.830985 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 17 00:32:41.830994 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 17 00:32:41.831003 kernel: Freeing SMP alternatives memory: 32K May 17 00:32:41.831012 kernel: pid_max: default: 32768 minimum: 301 May 17 00:32:41.831035 kernel: LSM: Security Framework initializing May 17 00:32:41.831042 kernel: SELinux: Initializing. May 17 00:32:41.831049 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:32:41.831057 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 17 00:32:41.831064 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 17 00:32:41.831071 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 17 00:32:41.831078 kernel: ... version: 0 May 17 00:32:41.831085 kernel: ... bit width: 48 May 17 00:32:41.831092 kernel: ... generic registers: 6 May 17 00:32:41.831098 kernel: ... value mask: 0000ffffffffffff May 17 00:32:41.831105 kernel: ... max period: 00007fffffffffff May 17 00:32:41.831112 kernel: ... fixed-purpose events: 0 May 17 00:32:41.831120 kernel: ... event mask: 000000000000003f May 17 00:32:41.831127 kernel: signal: max sigframe size: 1776 May 17 00:32:41.831134 kernel: rcu: Hierarchical SRCU implementation. May 17 00:32:41.831141 kernel: smp: Bringing up secondary CPUs ... May 17 00:32:41.831148 kernel: x86: Booting SMP configuration: May 17 00:32:41.831155 kernel: .... node #0, CPUs: #1 May 17 00:32:41.831161 kernel: kvm-clock: cpu 1, msr 4b19a041, secondary cpu clock May 17 00:32:41.831168 kernel: kvm-guest: setup async PF for cpu 1 May 17 00:32:41.831175 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 17 00:32:41.831183 kernel: #2 May 17 00:32:41.831190 kernel: kvm-clock: cpu 2, msr 4b19a081, secondary cpu clock May 17 00:32:41.831197 kernel: kvm-guest: setup async PF for cpu 2 May 17 00:32:41.831204 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 17 00:32:41.831210 kernel: #3 May 17 00:32:41.831217 kernel: kvm-clock: cpu 3, msr 4b19a0c1, secondary cpu clock May 17 00:32:41.831224 kernel: kvm-guest: setup async PF for cpu 3 May 17 00:32:41.831231 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 17 00:32:41.831237 kernel: smp: Brought up 1 node, 4 CPUs May 17 00:32:41.831244 kernel: smpboot: Max logical packages: 1 May 17 00:32:41.831252 kernel: smpboot: Total of 4 processors activated (22357.96 BogoMIPS) May 17 00:32:41.831259 kernel: devtmpfs: initialized May 17 00:32:41.831266 kernel: x86/mm: Memory block size: 128MB May 17 00:32:41.831273 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 17 00:32:41.831280 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 17 00:32:41.831287 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 17 00:32:41.831294 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 17 00:32:41.831301 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 17 00:32:41.831308 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 17 00:32:41.831316 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 17 00:32:41.831323 kernel: pinctrl core: initialized pinctrl subsystem May 17 00:32:41.831330 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 17 00:32:41.831337 kernel: audit: initializing netlink subsys (disabled) May 17 00:32:41.831343 kernel: audit: type=2000 audit(1747441961.484:1): state=initialized audit_enabled=0 res=1 May 17 00:32:41.831359 kernel: thermal_sys: Registered thermal governor 'step_wise' May 17 00:32:41.831367 kernel: thermal_sys: Registered thermal governor 'user_space' May 17 00:32:41.831374 kernel: cpuidle: using governor menu May 17 00:32:41.831381 kernel: ACPI: bus type PCI registered May 17 00:32:41.831389 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 17 00:32:41.831396 kernel: dca service started, version 1.12.1 May 17 00:32:41.831403 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 17 00:32:41.831410 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 17 00:32:41.831417 kernel: PCI: Using configuration type 1 for base access May 17 00:32:41.831424 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 17 00:32:41.831431 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 17 00:32:41.831437 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 17 00:32:41.831446 kernel: ACPI: Added _OSI(Module Device) May 17 00:32:41.831452 kernel: ACPI: Added _OSI(Processor Device) May 17 00:32:41.831459 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 17 00:32:41.831466 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 17 00:32:41.831473 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 17 00:32:41.831480 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 17 00:32:41.831487 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 17 00:32:41.831493 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 17 00:32:41.831500 kernel: ACPI: Interpreter enabled May 17 00:32:41.831507 kernel: ACPI: PM: (supports S0 S3 S5) May 17 00:32:41.831515 kernel: ACPI: Using IOAPIC for interrupt routing May 17 00:32:41.831522 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 17 00:32:41.831529 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 17 00:32:41.831535 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 17 00:32:41.831649 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 17 00:32:41.831721 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 17 00:32:41.831787 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 17 00:32:41.831798 kernel: PCI host bridge to bus 0000:00 May 17 00:32:41.831868 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 17 00:32:41.831929 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 17 00:32:41.832011 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 17 00:32:41.832085 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 17 00:32:41.832172 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 17 00:32:41.832262 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 17 00:32:41.832556 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 17 00:32:41.832696 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 17 00:32:41.832773 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 17 00:32:41.832843 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 17 00:32:41.832910 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 17 00:32:41.833005 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 17 00:32:41.833108 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 17 00:32:41.833182 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 17 00:32:41.833260 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 17 00:32:41.833334 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 17 00:32:41.833403 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 17 00:32:41.833473 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 17 00:32:41.833547 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 17 00:32:41.833619 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 17 00:32:41.833686 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 17 00:32:41.833754 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 17 00:32:41.833829 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 17 00:32:41.833898 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 17 00:32:41.833989 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 17 00:32:41.834090 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 17 00:32:41.834161 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 17 00:32:41.834234 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 17 00:32:41.834301 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 17 00:32:41.834375 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 17 00:32:41.834443 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 17 00:32:41.834511 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 17 00:32:41.834583 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 17 00:32:41.834654 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 17 00:32:41.834664 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 17 00:32:41.834671 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 17 00:32:41.834678 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 17 00:32:41.834685 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 17 00:32:41.834692 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 17 00:32:41.834699 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 17 00:32:41.834706 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 17 00:32:41.834714 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 17 00:32:41.834721 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 17 00:32:41.834728 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 17 00:32:41.834735 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 17 00:32:41.834741 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 17 00:32:41.834748 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 17 00:32:41.834755 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 17 00:32:41.834762 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 17 00:32:41.834769 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 17 00:32:41.834777 kernel: iommu: Default domain type: Translated May 17 00:32:41.834784 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 17 00:32:41.834853 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 17 00:32:41.834921 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 17 00:32:41.835015 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 17 00:32:41.835036 kernel: vgaarb: loaded May 17 00:32:41.835043 kernel: pps_core: LinuxPPS API ver. 1 registered May 17 00:32:41.835050 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 17 00:32:41.835057 kernel: PTP clock support registered May 17 00:32:41.835067 kernel: Registered efivars operations May 17 00:32:41.835073 kernel: PCI: Using ACPI for IRQ routing May 17 00:32:41.835080 kernel: PCI: pci_cache_line_size set to 64 bytes May 17 00:32:41.835087 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 17 00:32:41.835094 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 17 00:32:41.835101 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 17 00:32:41.835107 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 17 00:32:41.835114 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 17 00:32:41.835121 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 17 00:32:41.835129 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 17 00:32:41.835136 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 17 00:32:41.835143 kernel: clocksource: Switched to clocksource kvm-clock May 17 00:32:41.835150 kernel: VFS: Disk quotas dquot_6.6.0 May 17 00:32:41.835157 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 17 00:32:41.835164 kernel: pnp: PnP ACPI init May 17 00:32:41.835241 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 17 00:32:41.835252 kernel: pnp: PnP ACPI: found 6 devices May 17 00:32:41.835261 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 17 00:32:41.835268 kernel: NET: Registered PF_INET protocol family May 17 00:32:41.835285 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 17 00:32:41.839253 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 17 00:32:41.839272 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 17 00:32:41.839280 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 17 00:32:41.839287 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 17 00:32:41.839294 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 17 00:32:41.839304 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:32:41.839311 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 17 00:32:41.839318 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 17 00:32:41.839325 kernel: NET: Registered PF_XDP protocol family May 17 00:32:41.839410 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 17 00:32:41.839483 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 17 00:32:41.839543 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 17 00:32:41.839603 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 17 00:32:41.839667 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 17 00:32:41.839727 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 17 00:32:41.839785 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 17 00:32:41.839844 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 17 00:32:41.839853 kernel: PCI: CLS 0 bytes, default 64 May 17 00:32:41.839860 kernel: Initialise system trusted keyrings May 17 00:32:41.839868 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 17 00:32:41.839874 kernel: Key type asymmetric registered May 17 00:32:41.839881 kernel: Asymmetric key parser 'x509' registered May 17 00:32:41.839891 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 17 00:32:41.839898 kernel: io scheduler mq-deadline registered May 17 00:32:41.839915 kernel: io scheduler kyber registered May 17 00:32:41.839923 kernel: io scheduler bfq registered May 17 00:32:41.839930 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 17 00:32:41.839948 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 17 00:32:41.839957 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 17 00:32:41.839966 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 17 00:32:41.839976 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 17 00:32:41.839987 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 17 00:32:41.839996 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 17 00:32:41.840003 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 17 00:32:41.840010 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 17 00:32:41.840029 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 17 00:32:41.840104 kernel: rtc_cmos 00:04: RTC can wake from S4 May 17 00:32:41.840167 kernel: rtc_cmos 00:04: registered as rtc0 May 17 00:32:41.840229 kernel: rtc_cmos 00:04: setting system clock to 2025-05-17T00:32:41 UTC (1747441961) May 17 00:32:41.840292 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 17 00:32:41.840301 kernel: efifb: probing for efifb May 17 00:32:41.840309 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 17 00:32:41.840316 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 17 00:32:41.840323 kernel: efifb: scrolling: redraw May 17 00:32:41.840331 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 17 00:32:41.840338 kernel: Console: switching to colour frame buffer device 160x50 May 17 00:32:41.840345 kernel: fb0: EFI VGA frame buffer device May 17 00:32:41.840353 kernel: pstore: Registered efi as persistent store backend May 17 00:32:41.840361 kernel: NET: Registered PF_INET6 protocol family May 17 00:32:41.840369 kernel: Segment Routing with IPv6 May 17 00:32:41.840376 kernel: In-situ OAM (IOAM) with IPv6 May 17 00:32:41.840384 kernel: NET: Registered PF_PACKET protocol family May 17 00:32:41.840392 kernel: Key type dns_resolver registered May 17 00:32:41.840399 kernel: IPI shorthand broadcast: enabled May 17 00:32:41.840407 kernel: sched_clock: Marking stable (445468551, 127542550)->(587910271, -14899170) May 17 00:32:41.840414 kernel: registered taskstats version 1 May 17 00:32:41.840422 kernel: Loading compiled-in X.509 certificates May 17 00:32:41.840429 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 01ca23caa8e5879327538f9287e5164b3e97ac0c' May 17 00:32:41.840436 kernel: Key type .fscrypt registered May 17 00:32:41.840443 kernel: Key type fscrypt-provisioning registered May 17 00:32:41.840452 kernel: pstore: Using crash dump compression: deflate May 17 00:32:41.840459 kernel: ima: No TPM chip found, activating TPM-bypass! May 17 00:32:41.840468 kernel: ima: Allocated hash algorithm: sha1 May 17 00:32:41.840475 kernel: ima: No architecture policies found May 17 00:32:41.840483 kernel: clk: Disabling unused clocks May 17 00:32:41.840490 kernel: Freeing unused kernel image (initmem) memory: 47472K May 17 00:32:41.840497 kernel: Write protecting the kernel read-only data: 28672k May 17 00:32:41.840505 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 17 00:32:41.840512 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 17 00:32:41.840519 kernel: Run /init as init process May 17 00:32:41.840527 kernel: with arguments: May 17 00:32:41.840535 kernel: /init May 17 00:32:41.840542 kernel: with environment: May 17 00:32:41.840549 kernel: HOME=/ May 17 00:32:41.840556 kernel: TERM=linux May 17 00:32:41.840564 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 17 00:32:41.840575 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:32:41.840584 systemd[1]: Detected virtualization kvm. May 17 00:32:41.840592 systemd[1]: Detected architecture x86-64. May 17 00:32:41.840601 systemd[1]: Running in initrd. May 17 00:32:41.840608 systemd[1]: No hostname configured, using default hostname. May 17 00:32:41.840616 systemd[1]: Hostname set to . May 17 00:32:41.840624 systemd[1]: Initializing machine ID from VM UUID. May 17 00:32:41.840632 systemd[1]: Queued start job for default target initrd.target. May 17 00:32:41.840640 systemd[1]: Started systemd-ask-password-console.path. May 17 00:32:41.840647 systemd[1]: Reached target cryptsetup.target. May 17 00:32:41.840655 systemd[1]: Reached target paths.target. May 17 00:32:41.840662 systemd[1]: Reached target slices.target. May 17 00:32:41.840672 systemd[1]: Reached target swap.target. May 17 00:32:41.840679 systemd[1]: Reached target timers.target. May 17 00:32:41.840688 systemd[1]: Listening on iscsid.socket. May 17 00:32:41.840695 systemd[1]: Listening on iscsiuio.socket. May 17 00:32:41.840703 systemd[1]: Listening on systemd-journald-audit.socket. May 17 00:32:41.840711 systemd[1]: Listening on systemd-journald-dev-log.socket. May 17 00:32:41.840719 systemd[1]: Listening on systemd-journald.socket. May 17 00:32:41.840728 systemd[1]: Listening on systemd-networkd.socket. May 17 00:32:41.840736 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:32:41.840744 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:32:41.840752 systemd[1]: Reached target sockets.target. May 17 00:32:41.840759 systemd[1]: Starting kmod-static-nodes.service... May 17 00:32:41.840767 systemd[1]: Finished network-cleanup.service. May 17 00:32:41.840775 systemd[1]: Starting systemd-fsck-usr.service... May 17 00:32:41.840782 systemd[1]: Starting systemd-journald.service... May 17 00:32:41.840790 systemd[1]: Starting systemd-modules-load.service... May 17 00:32:41.840799 systemd[1]: Starting systemd-resolved.service... May 17 00:32:41.840807 systemd[1]: Starting systemd-vconsole-setup.service... May 17 00:32:41.840815 systemd[1]: Finished kmod-static-nodes.service. May 17 00:32:41.840823 systemd[1]: Finished systemd-fsck-usr.service. May 17 00:32:41.840830 kernel: audit: type=1130 audit(1747441961.829:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.840838 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:32:41.840846 systemd[1]: Finished systemd-vconsole-setup.service. May 17 00:32:41.840854 kernel: audit: type=1130 audit(1747441961.838:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.840865 systemd-journald[198]: Journal started May 17 00:32:41.840947 systemd-journald[198]: Runtime Journal (/run/log/journal/235d7b52642c4482af8693dd73f39065) is 6.0M, max 48.4M, 42.4M free. May 17 00:32:41.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.835920 systemd-modules-load[199]: Inserted module 'overlay' May 17 00:32:41.843099 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:32:41.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.847652 kernel: audit: type=1130 audit(1747441961.843:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.847671 systemd[1]: Started systemd-journald.service. May 17 00:32:41.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.851489 systemd[1]: Starting dracut-cmdline-ask.service... May 17 00:32:41.852653 kernel: audit: type=1130 audit(1747441961.848:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.861568 systemd-resolved[200]: Positive Trust Anchors: May 17 00:32:41.861582 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:32:41.861610 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:32:41.863676 systemd-resolved[200]: Defaulting to hostname 'linux'. May 17 00:32:41.864371 systemd[1]: Started systemd-resolved.service. May 17 00:32:41.864504 systemd[1]: Reached target nss-lookup.target. May 17 00:32:41.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.868039 kernel: audit: type=1130 audit(1747441961.861:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.879055 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 17 00:32:41.880599 systemd[1]: Finished dracut-cmdline-ask.service. May 17 00:32:41.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.883093 systemd[1]: Starting dracut-cmdline.service... May 17 00:32:41.887293 kernel: audit: type=1130 audit(1747441961.882:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.887321 kernel: Bridge firewalling registered May 17 00:32:41.887216 systemd-modules-load[199]: Inserted module 'br_netfilter' May 17 00:32:41.893623 dracut-cmdline[217]: dracut-dracut-053 May 17 00:32:41.896038 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=4aad7caeadb0359f379975532748a0b4ae6bb9b229507353e0f5ae84cb9335a0 May 17 00:32:41.904046 kernel: SCSI subsystem initialized May 17 00:32:41.915259 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 17 00:32:41.915329 kernel: device-mapper: uevent: version 1.0.3 May 17 00:32:41.915347 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 17 00:32:41.919151 systemd-modules-load[199]: Inserted module 'dm_multipath' May 17 00:32:41.919980 systemd[1]: Finished systemd-modules-load.service. May 17 00:32:41.924531 kernel: audit: type=1130 audit(1747441961.920:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.921082 systemd[1]: Starting systemd-sysctl.service... May 17 00:32:41.930672 systemd[1]: Finished systemd-sysctl.service. May 17 00:32:41.935526 kernel: audit: type=1130 audit(1747441961.931:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:41.960039 kernel: Loading iSCSI transport class v2.0-870. May 17 00:32:41.976051 kernel: iscsi: registered transport (tcp) May 17 00:32:41.997200 kernel: iscsi: registered transport (qla4xxx) May 17 00:32:41.997232 kernel: QLogic iSCSI HBA Driver May 17 00:32:42.024425 systemd[1]: Finished dracut-cmdline.service. May 17 00:32:42.028809 kernel: audit: type=1130 audit(1747441962.024:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:42.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:42.028842 systemd[1]: Starting dracut-pre-udev.service... May 17 00:32:42.075060 kernel: raid6: avx2x4 gen() 30010 MB/s May 17 00:32:42.092038 kernel: raid6: avx2x4 xor() 7408 MB/s May 17 00:32:42.109040 kernel: raid6: avx2x2 gen() 31083 MB/s May 17 00:32:42.126041 kernel: raid6: avx2x2 xor() 19239 MB/s May 17 00:32:42.143038 kernel: raid6: avx2x1 gen() 25996 MB/s May 17 00:32:42.160043 kernel: raid6: avx2x1 xor() 15361 MB/s May 17 00:32:42.177040 kernel: raid6: sse2x4 gen() 14705 MB/s May 17 00:32:42.194042 kernel: raid6: sse2x4 xor() 7144 MB/s May 17 00:32:42.211039 kernel: raid6: sse2x2 gen() 16119 MB/s May 17 00:32:42.228042 kernel: raid6: sse2x2 xor() 9843 MB/s May 17 00:32:42.245039 kernel: raid6: sse2x1 gen() 12123 MB/s May 17 00:32:42.262426 kernel: raid6: sse2x1 xor() 7799 MB/s May 17 00:32:42.262439 kernel: raid6: using algorithm avx2x2 gen() 31083 MB/s May 17 00:32:42.262456 kernel: raid6: .... xor() 19239 MB/s, rmw enabled May 17 00:32:42.263154 kernel: raid6: using avx2x2 recovery algorithm May 17 00:32:42.276047 kernel: xor: automatically using best checksumming function avx May 17 00:32:42.368055 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 17 00:32:42.376416 systemd[1]: Finished dracut-pre-udev.service. May 17 00:32:42.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:42.378000 audit: BPF prog-id=7 op=LOAD May 17 00:32:42.378000 audit: BPF prog-id=8 op=LOAD May 17 00:32:42.378512 systemd[1]: Starting systemd-udevd.service... May 17 00:32:42.390837 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 17 00:32:42.395143 systemd[1]: Started systemd-udevd.service. May 17 00:32:42.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:42.396037 systemd[1]: Starting dracut-pre-trigger.service... May 17 00:32:42.405683 dracut-pre-trigger[402]: rd.md=0: removing MD RAID activation May 17 00:32:42.429725 systemd[1]: Finished dracut-pre-trigger.service. May 17 00:32:42.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:42.430721 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:32:42.465508 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:32:42.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:42.500319 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 17 00:32:42.505661 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 17 00:32:42.505673 kernel: GPT:9289727 != 19775487 May 17 00:32:42.505682 kernel: GPT:Alternate GPT header not at the end of the disk. May 17 00:32:42.505691 kernel: GPT:9289727 != 19775487 May 17 00:32:42.505699 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:32:42.505711 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:42.508047 kernel: cryptd: max_cpu_qlen set to 1000 May 17 00:32:42.514052 kernel: libata version 3.00 loaded. May 17 00:32:42.519046 kernel: AVX2 version of gcm_enc/dec engaged. May 17 00:32:42.519068 kernel: AES CTR mode by8 optimization enabled May 17 00:32:42.523908 kernel: ahci 0000:00:1f.2: version 3.0 May 17 00:32:42.553177 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 17 00:32:42.553194 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 17 00:32:42.553289 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 17 00:32:42.553370 kernel: scsi host0: ahci May 17 00:32:42.553471 kernel: scsi host1: ahci May 17 00:32:42.553554 kernel: scsi host2: ahci May 17 00:32:42.553649 kernel: scsi host3: ahci May 17 00:32:42.553731 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (447) May 17 00:32:42.553740 kernel: scsi host4: ahci May 17 00:32:42.553824 kernel: scsi host5: ahci May 17 00:32:42.553910 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 17 00:32:42.553928 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 17 00:32:42.553938 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 17 00:32:42.553947 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 17 00:32:42.553956 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 17 00:32:42.553964 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 17 00:32:42.535797 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 17 00:32:42.544701 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 17 00:32:42.547473 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 17 00:32:42.557087 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:32:42.562397 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 17 00:32:42.565860 systemd[1]: Starting disk-uuid.service... May 17 00:32:42.573711 disk-uuid[522]: Primary Header is updated. May 17 00:32:42.573711 disk-uuid[522]: Secondary Entries is updated. May 17 00:32:42.573711 disk-uuid[522]: Secondary Header is updated. May 17 00:32:42.577134 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:42.579523 kernel: GPT:disk_guids don't match. May 17 00:32:42.579535 kernel: GPT: Use GNU Parted to correct GPT errors. May 17 00:32:42.579545 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:42.584040 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:42.865052 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 17 00:32:42.865129 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 17 00:32:42.866054 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 17 00:32:42.867056 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 17 00:32:42.868045 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 17 00:32:42.869060 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 17 00:32:42.870050 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 17 00:32:42.871316 kernel: ata3.00: applying bridge limits May 17 00:32:42.872052 kernel: ata3.00: configured for UDMA/100 May 17 00:32:42.873047 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 17 00:32:42.906240 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 17 00:32:42.923645 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 17 00:32:42.923661 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 17 00:32:43.583575 disk-uuid[523]: The operation has completed successfully. May 17 00:32:43.585121 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 17 00:32:43.603839 systemd[1]: disk-uuid.service: Deactivated successfully. May 17 00:32:43.603925 systemd[1]: Finished disk-uuid.service. May 17 00:32:43.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.615914 systemd[1]: Starting verity-setup.service... May 17 00:32:43.629058 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 17 00:32:43.646146 systemd[1]: Found device dev-mapper-usr.device. May 17 00:32:43.648466 systemd[1]: Mounting sysusr-usr.mount... May 17 00:32:43.649884 systemd[1]: Finished verity-setup.service. May 17 00:32:43.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.709048 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 17 00:32:43.709541 systemd[1]: Mounted sysusr-usr.mount. May 17 00:32:43.710163 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 17 00:32:43.711010 systemd[1]: Starting ignition-setup.service... May 17 00:32:43.711873 systemd[1]: Starting parse-ip-for-networkd.service... May 17 00:32:43.724850 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:32:43.724884 kernel: BTRFS info (device vda6): using free space tree May 17 00:32:43.724904 kernel: BTRFS info (device vda6): has skinny extents May 17 00:32:43.732419 systemd[1]: mnt-oem.mount: Deactivated successfully. May 17 00:32:43.740994 systemd[1]: Finished ignition-setup.service. May 17 00:32:43.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.743193 systemd[1]: Starting ignition-fetch-offline.service... May 17 00:32:43.772277 systemd[1]: Finished parse-ip-for-networkd.service. May 17 00:32:43.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.775000 audit: BPF prog-id=9 op=LOAD May 17 00:32:43.775729 systemd[1]: Starting systemd-networkd.service... May 17 00:32:43.777735 ignition[658]: Ignition 2.14.0 May 17 00:32:43.777741 ignition[658]: Stage: fetch-offline May 17 00:32:43.777790 ignition[658]: no configs at "/usr/lib/ignition/base.d" May 17 00:32:43.777798 ignition[658]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:43.777883 ignition[658]: parsed url from cmdline: "" May 17 00:32:43.777886 ignition[658]: no config URL provided May 17 00:32:43.777897 ignition[658]: reading system config file "/usr/lib/ignition/user.ign" May 17 00:32:43.777903 ignition[658]: no config at "/usr/lib/ignition/user.ign" May 17 00:32:43.777919 ignition[658]: op(1): [started] loading QEMU firmware config module May 17 00:32:43.777923 ignition[658]: op(1): executing: "modprobe" "qemu_fw_cfg" May 17 00:32:43.786199 ignition[658]: op(1): [finished] loading QEMU firmware config module May 17 00:32:43.797903 systemd-networkd[715]: lo: Link UP May 17 00:32:43.797911 systemd-networkd[715]: lo: Gained carrier May 17 00:32:43.798506 systemd-networkd[715]: Enumeration completed May 17 00:32:43.798723 systemd[1]: Started systemd-networkd.service. May 17 00:32:43.798903 systemd-networkd[715]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:32:43.800193 systemd-networkd[715]: eth0: Link UP May 17 00:32:43.800196 systemd-networkd[715]: eth0: Gained carrier May 17 00:32:43.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.804740 systemd[1]: Reached target network.target. May 17 00:32:43.806881 systemd[1]: Starting iscsiuio.service... May 17 00:32:43.810630 systemd[1]: Started iscsiuio.service. May 17 00:32:43.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.812833 systemd[1]: Starting iscsid.service... May 17 00:32:43.814953 iscsid[721]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 17 00:32:43.814953 iscsid[721]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 17 00:32:43.814953 iscsid[721]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 17 00:32:43.814953 iscsid[721]: If using hardware iscsi like qla4xxx this message can be ignored. May 17 00:32:43.814953 iscsid[721]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 17 00:32:43.814953 iscsid[721]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 17 00:32:43.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.816516 systemd[1]: Started iscsid.service. May 17 00:32:43.828573 systemd[1]: Starting dracut-initqueue.service... May 17 00:32:43.837493 systemd[1]: Finished dracut-initqueue.service. May 17 00:32:43.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.838056 systemd[1]: Reached target remote-fs-pre.target. May 17 00:32:43.838138 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:32:43.838312 systemd[1]: Reached target remote-fs.target. May 17 00:32:43.839093 systemd[1]: Starting dracut-pre-mount.service... May 17 00:32:43.845660 systemd[1]: Finished dracut-pre-mount.service. May 17 00:32:43.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.850000 ignition[658]: parsing config with SHA512: b4136d128e965325927c31de50c0b9cd816e1a6614290386faa968a75892353a65170935fe3447a489e54e25f19254d9d0e6c787651edd72b227d03d3431c550 May 17 00:32:43.856684 unknown[658]: fetched base config from "system" May 17 00:32:43.856694 unknown[658]: fetched user config from "qemu" May 17 00:32:43.857107 ignition[658]: fetch-offline: fetch-offline passed May 17 00:32:43.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.858253 systemd[1]: Finished ignition-fetch-offline.service. May 17 00:32:43.857151 ignition[658]: Ignition finished successfully May 17 00:32:43.859724 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 17 00:32:43.859736 systemd-networkd[715]: eth0: DHCPv4 address 10.0.0.99/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 17 00:32:43.860304 systemd[1]: Starting ignition-kargs.service... May 17 00:32:43.872677 ignition[736]: Ignition 2.14.0 May 17 00:32:43.873261 ignition[736]: Stage: kargs May 17 00:32:43.873347 ignition[736]: no configs at "/usr/lib/ignition/base.d" May 17 00:32:43.873355 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:43.874198 ignition[736]: kargs: kargs passed May 17 00:32:43.876251 systemd[1]: Finished ignition-kargs.service. May 17 00:32:43.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.874227 ignition[736]: Ignition finished successfully May 17 00:32:43.878222 systemd[1]: Starting ignition-disks.service... May 17 00:32:43.884249 ignition[742]: Ignition 2.14.0 May 17 00:32:43.884258 ignition[742]: Stage: disks May 17 00:32:43.884342 ignition[742]: no configs at "/usr/lib/ignition/base.d" May 17 00:32:43.886217 systemd[1]: Finished ignition-disks.service. May 17 00:32:43.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.884351 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:43.887854 systemd[1]: Reached target initrd-root-device.target. May 17 00:32:43.885233 ignition[742]: disks: disks passed May 17 00:32:43.889372 systemd[1]: Reached target local-fs-pre.target. May 17 00:32:43.885267 ignition[742]: Ignition finished successfully May 17 00:32:43.890166 systemd[1]: Reached target local-fs.target. May 17 00:32:43.890913 systemd[1]: Reached target sysinit.target. May 17 00:32:43.892627 systemd[1]: Reached target basic.target. May 17 00:32:43.893901 systemd[1]: Starting systemd-fsck-root.service... May 17 00:32:43.904146 systemd-fsck[750]: ROOT: clean, 619/553520 files, 56023/553472 blocks May 17 00:32:43.909121 systemd[1]: Finished systemd-fsck-root.service. May 17 00:32:43.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.911652 systemd[1]: Mounting sysroot.mount... May 17 00:32:43.917947 systemd[1]: Mounted sysroot.mount. May 17 00:32:43.919286 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 17 00:32:43.919318 systemd[1]: Reached target initrd-root-fs.target. May 17 00:32:43.921600 systemd[1]: Mounting sysroot-usr.mount... May 17 00:32:43.923218 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 17 00:32:43.923250 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 17 00:32:43.923268 systemd[1]: Reached target ignition-diskful.target. May 17 00:32:43.928479 systemd[1]: Mounted sysroot-usr.mount. May 17 00:32:43.930387 systemd[1]: Starting initrd-setup-root.service... May 17 00:32:43.933847 initrd-setup-root[760]: cut: /sysroot/etc/passwd: No such file or directory May 17 00:32:43.936992 initrd-setup-root[768]: cut: /sysroot/etc/group: No such file or directory May 17 00:32:43.940689 initrd-setup-root[776]: cut: /sysroot/etc/shadow: No such file or directory May 17 00:32:43.943978 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory May 17 00:32:43.967531 systemd[1]: Finished initrd-setup-root.service. May 17 00:32:43.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.969007 systemd[1]: Starting ignition-mount.service... May 17 00:32:43.970310 systemd[1]: Starting sysroot-boot.service... May 17 00:32:43.973394 bash[801]: umount: /sysroot/usr/share/oem: not mounted. May 17 00:32:43.980017 ignition[802]: INFO : Ignition 2.14.0 May 17 00:32:43.980017 ignition[802]: INFO : Stage: mount May 17 00:32:43.981621 ignition[802]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:32:43.981621 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:43.984573 ignition[802]: INFO : mount: mount passed May 17 00:32:43.985371 ignition[802]: INFO : Ignition finished successfully May 17 00:32:43.986664 systemd[1]: Finished ignition-mount.service. May 17 00:32:43.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:43.988915 systemd[1]: Finished sysroot-boot.service. May 17 00:32:43.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:44.658644 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 17 00:32:44.664041 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (811) May 17 00:32:44.666099 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 17 00:32:44.666131 kernel: BTRFS info (device vda6): using free space tree May 17 00:32:44.666141 kernel: BTRFS info (device vda6): has skinny extents May 17 00:32:44.669782 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 17 00:32:44.671426 systemd[1]: Starting ignition-files.service... May 17 00:32:44.684694 ignition[831]: INFO : Ignition 2.14.0 May 17 00:32:44.684694 ignition[831]: INFO : Stage: files May 17 00:32:44.686435 ignition[831]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:32:44.686435 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:44.688855 ignition[831]: DEBUG : files: compiled without relabeling support, skipping May 17 00:32:44.688855 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 17 00:32:44.688855 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 17 00:32:44.688855 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 17 00:32:44.688855 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 17 00:32:44.695569 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 17 00:32:44.695569 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:32:44.695569 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 17 00:32:44.689335 unknown[831]: wrote ssh authorized keys file for user: core May 17 00:32:44.742071 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 17 00:32:44.926907 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 17 00:32:44.926907 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:32:44.931089 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://extensions.flatcar.org/extensions/kubernetes-v1.31.8-x86-64.raw: attempt #1 May 17 00:32:45.426213 systemd-networkd[715]: eth0: Gained IPv6LL May 17 00:32:45.608785 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 17 00:32:45.906370 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.8-x86-64.raw" May 17 00:32:45.906370 ignition[831]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 17 00:32:45.909997 ignition[831]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:32:45.909997 ignition[831]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 17 00:32:45.909997 ignition[831]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 17 00:32:45.909997 ignition[831]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 17 00:32:45.909997 ignition[831]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:32:45.917924 ignition[831]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 17 00:32:45.917924 ignition[831]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 17 00:32:45.917924 ignition[831]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 17 00:32:45.917924 ignition[831]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 17 00:32:45.917924 ignition[831]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 17 00:32:45.917924 ignition[831]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:32:45.943931 ignition[831]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 17 00:32:45.945864 ignition[831]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 17 00:32:45.947680 ignition[831]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 17 00:32:45.949797 ignition[831]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 17 00:32:45.949797 ignition[831]: INFO : files: files passed May 17 00:32:45.952691 ignition[831]: INFO : Ignition finished successfully May 17 00:32:45.955085 systemd[1]: Finished ignition-files.service. May 17 00:32:45.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.956392 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 17 00:32:45.957518 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 17 00:32:45.958143 systemd[1]: Starting ignition-quench.service... May 17 00:32:45.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.962000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.960511 systemd[1]: ignition-quench.service: Deactivated successfully. May 17 00:32:45.960619 systemd[1]: Finished ignition-quench.service. May 17 00:32:45.968348 initrd-setup-root-after-ignition[856]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 17 00:32:45.971332 initrd-setup-root-after-ignition[858]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 17 00:32:45.972165 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 17 00:32:45.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.975157 systemd[1]: Reached target ignition-complete.target. May 17 00:32:45.976887 systemd[1]: Starting initrd-parse-etc.service... May 17 00:32:45.989501 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 17 00:32:45.989587 systemd[1]: Finished initrd-parse-etc.service. May 17 00:32:45.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:45.991362 systemd[1]: Reached target initrd-fs.target. May 17 00:32:45.991795 systemd[1]: Reached target initrd.target. May 17 00:32:45.993814 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 17 00:32:45.994645 systemd[1]: Starting dracut-pre-pivot.service... May 17 00:32:46.003603 systemd[1]: Finished dracut-pre-pivot.service. May 17 00:32:46.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.004487 systemd[1]: Starting initrd-cleanup.service... May 17 00:32:46.011920 systemd[1]: Stopped target nss-lookup.target. May 17 00:32:46.012426 systemd[1]: Stopped target remote-cryptsetup.target. May 17 00:32:46.013909 systemd[1]: Stopped target timers.target. May 17 00:32:46.015312 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 17 00:32:46.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.015394 systemd[1]: Stopped dracut-pre-pivot.service. May 17 00:32:46.016932 systemd[1]: Stopped target initrd.target. May 17 00:32:46.018528 systemd[1]: Stopped target basic.target. May 17 00:32:46.020185 systemd[1]: Stopped target ignition-complete.target. May 17 00:32:46.020710 systemd[1]: Stopped target ignition-diskful.target. May 17 00:32:46.022620 systemd[1]: Stopped target initrd-root-device.target. May 17 00:32:46.024065 systemd[1]: Stopped target remote-fs.target. May 17 00:32:46.025799 systemd[1]: Stopped target remote-fs-pre.target. May 17 00:32:46.027328 systemd[1]: Stopped target sysinit.target. May 17 00:32:46.028778 systemd[1]: Stopped target local-fs.target. May 17 00:32:46.030373 systemd[1]: Stopped target local-fs-pre.target. May 17 00:32:46.031574 systemd[1]: Stopped target swap.target. May 17 00:32:46.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.033052 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 17 00:32:46.033146 systemd[1]: Stopped dracut-pre-mount.service. May 17 00:32:46.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.034503 systemd[1]: Stopped target cryptsetup.target. May 17 00:32:46.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.035836 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 17 00:32:46.035955 systemd[1]: Stopped dracut-initqueue.service. May 17 00:32:46.037369 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 17 00:32:46.037470 systemd[1]: Stopped ignition-fetch-offline.service. May 17 00:32:46.038998 systemd[1]: Stopped target paths.target. May 17 00:32:46.040412 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 17 00:32:46.044053 systemd[1]: Stopped systemd-ask-password-console.path. May 17 00:32:46.044565 systemd[1]: Stopped target slices.target. May 17 00:32:46.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.046093 systemd[1]: Stopped target sockets.target. May 17 00:32:46.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.047748 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 17 00:32:46.047864 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 17 00:32:46.049350 systemd[1]: ignition-files.service: Deactivated successfully. May 17 00:32:46.055804 iscsid[721]: iscsid shutting down. May 17 00:32:46.049445 systemd[1]: Stopped ignition-files.service. May 17 00:32:46.051927 systemd[1]: Stopping ignition-mount.service... May 17 00:32:46.052554 systemd[1]: Stopping iscsid.service... May 17 00:32:46.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.055466 systemd[1]: Stopping sysroot-boot.service... May 17 00:32:46.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.057678 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 17 00:32:46.057825 systemd[1]: Stopped systemd-udev-trigger.service. May 17 00:32:46.059385 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 17 00:32:46.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.059503 systemd[1]: Stopped dracut-pre-trigger.service. May 17 00:32:46.062737 systemd[1]: iscsid.service: Deactivated successfully. May 17 00:32:46.062835 systemd[1]: Stopped iscsid.service. May 17 00:32:46.064811 systemd[1]: iscsid.socket: Deactivated successfully. May 17 00:32:46.064906 systemd[1]: Closed iscsid.socket. May 17 00:32:46.065927 systemd[1]: Stopping iscsiuio.service... May 17 00:32:46.070000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.069927 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 17 00:32:46.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.072000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.070348 systemd[1]: iscsiuio.service: Deactivated successfully. May 17 00:32:46.070424 systemd[1]: Stopped iscsiuio.service. May 17 00:32:46.071190 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 17 00:32:46.071263 systemd[1]: Finished initrd-cleanup.service. May 17 00:32:46.073712 systemd[1]: iscsiuio.socket: Deactivated successfully. May 17 00:32:46.073744 systemd[1]: Closed iscsiuio.socket. May 17 00:32:46.085145 ignition[871]: INFO : Ignition 2.14.0 May 17 00:32:46.085145 ignition[871]: INFO : Stage: umount May 17 00:32:46.086748 ignition[871]: INFO : no configs at "/usr/lib/ignition/base.d" May 17 00:32:46.086748 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 17 00:32:46.089833 ignition[871]: INFO : umount: umount passed May 17 00:32:46.090674 ignition[871]: INFO : Ignition finished successfully May 17 00:32:46.092141 systemd[1]: ignition-mount.service: Deactivated successfully. May 17 00:32:46.092215 systemd[1]: Stopped ignition-mount.service. May 17 00:32:46.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.093830 systemd[1]: Stopped target network.target. May 17 00:32:46.095157 systemd[1]: ignition-disks.service: Deactivated successfully. May 17 00:32:46.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.095190 systemd[1]: Stopped ignition-disks.service. May 17 00:32:46.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.096757 systemd[1]: ignition-kargs.service: Deactivated successfully. May 17 00:32:46.099000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.096795 systemd[1]: Stopped ignition-kargs.service. May 17 00:32:46.098417 systemd[1]: ignition-setup.service: Deactivated successfully. May 17 00:32:46.098459 systemd[1]: Stopped ignition-setup.service. May 17 00:32:46.099482 systemd[1]: Stopping systemd-networkd.service... May 17 00:32:46.101480 systemd[1]: Stopping systemd-resolved.service... May 17 00:32:46.108158 systemd[1]: systemd-resolved.service: Deactivated successfully. May 17 00:32:46.108246 systemd[1]: Stopped systemd-resolved.service. May 17 00:32:46.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.111106 systemd-networkd[715]: eth0: DHCPv6 lease lost May 17 00:32:46.112262 systemd[1]: systemd-networkd.service: Deactivated successfully. May 17 00:32:46.112000 audit: BPF prog-id=6 op=UNLOAD May 17 00:32:46.113376 systemd[1]: Stopped systemd-networkd.service. May 17 00:32:46.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.115639 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 17 00:32:46.115675 systemd[1]: Closed systemd-networkd.socket. May 17 00:32:46.118875 systemd[1]: Stopping network-cleanup.service... May 17 00:32:46.120000 audit: BPF prog-id=9 op=UNLOAD May 17 00:32:46.120654 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 17 00:32:46.120710 systemd[1]: Stopped parse-ip-for-networkd.service. May 17 00:32:46.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.123878 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 17 00:32:46.124882 systemd[1]: Stopped systemd-sysctl.service. May 17 00:32:46.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.126514 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 17 00:32:46.126559 systemd[1]: Stopped systemd-modules-load.service. May 17 00:32:46.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.129303 systemd[1]: Stopping systemd-udevd.service... May 17 00:32:46.132214 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 17 00:32:46.135538 systemd[1]: network-cleanup.service: Deactivated successfully. May 17 00:32:46.136671 systemd[1]: Stopped network-cleanup.service. May 17 00:32:46.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.138703 systemd[1]: systemd-udevd.service: Deactivated successfully. May 17 00:32:46.139775 systemd[1]: Stopped systemd-udevd.service. May 17 00:32:46.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.141997 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 17 00:32:46.142055 systemd[1]: Closed systemd-udevd-control.socket. May 17 00:32:46.144828 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 17 00:32:46.144888 systemd[1]: Closed systemd-udevd-kernel.socket. May 17 00:32:46.147565 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 17 00:32:46.148560 systemd[1]: Stopped dracut-pre-udev.service. May 17 00:32:46.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.150188 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 17 00:32:46.150223 systemd[1]: Stopped dracut-cmdline.service. May 17 00:32:46.152000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.152702 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 17 00:32:46.153714 systemd[1]: Stopped dracut-cmdline-ask.service. May 17 00:32:46.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.156085 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 17 00:32:46.157792 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 17 00:32:46.157832 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 17 00:32:46.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.160910 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 17 00:32:46.161912 systemd[1]: Stopped kmod-static-nodes.service. May 17 00:32:46.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.163649 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 17 00:32:46.164705 systemd[1]: Stopped systemd-vconsole-setup.service. May 17 00:32:46.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.167282 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 17 00:32:46.169069 systemd[1]: sysroot-boot.service: Deactivated successfully. May 17 00:32:46.170038 systemd[1]: Stopped sysroot-boot.service. May 17 00:32:46.171000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.171640 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 17 00:32:46.172710 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 17 00:32:46.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.174566 systemd[1]: Reached target initrd-switch-root.target. May 17 00:32:46.182751 kernel: kauditd_printk_skb: 63 callbacks suppressed May 17 00:32:46.182770 kernel: audit: type=1130 audit(1747441966.174:74): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.182780 kernel: audit: type=1131 audit(1747441966.174:75): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.182749 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 17 00:32:46.182794 systemd[1]: Stopped initrd-setup-root.service. May 17 00:32:46.188720 kernel: audit: type=1131 audit(1747441966.183:76): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:46.185225 systemd[1]: Starting initrd-switch-root.service... May 17 00:32:46.203064 systemd[1]: Switching root. May 17 00:32:46.221585 systemd-journald[198]: Journal stopped May 17 00:32:49.003330 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 17 00:32:49.003395 kernel: SELinux: Class mctp_socket not defined in policy. May 17 00:32:49.003413 kernel: SELinux: Class anon_inode not defined in policy. May 17 00:32:49.003426 kernel: SELinux: the above unknown classes and permissions will be allowed May 17 00:32:49.003439 kernel: SELinux: policy capability network_peer_controls=1 May 17 00:32:49.003451 kernel: SELinux: policy capability open_perms=1 May 17 00:32:49.003464 kernel: SELinux: policy capability extended_socket_class=1 May 17 00:32:49.003479 kernel: SELinux: policy capability always_check_network=0 May 17 00:32:49.003492 kernel: SELinux: policy capability cgroup_seclabel=1 May 17 00:32:49.003504 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 17 00:32:49.003516 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 17 00:32:49.003528 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 17 00:32:49.003540 kernel: audit: type=1403 audit(1747441966.278:77): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:32:49.003557 systemd[1]: Successfully loaded SELinux policy in 37.177ms. May 17 00:32:49.003575 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.522ms. May 17 00:32:49.003593 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 17 00:32:49.003608 systemd[1]: Detected virtualization kvm. May 17 00:32:49.003622 systemd[1]: Detected architecture x86-64. May 17 00:32:49.003641 systemd[1]: Detected first boot. May 17 00:32:49.003655 systemd[1]: Initializing machine ID from VM UUID. May 17 00:32:49.003668 kernel: audit: type=1400 audit(1747441966.451:78): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:32:49.003681 kernel: audit: type=1400 audit(1747441966.451:79): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:32:49.003693 kernel: audit: type=1334 audit(1747441966.456:80): prog-id=10 op=LOAD May 17 00:32:49.003707 kernel: audit: type=1334 audit(1747441966.456:81): prog-id=10 op=UNLOAD May 17 00:32:49.003720 kernel: audit: type=1334 audit(1747441966.458:82): prog-id=11 op=LOAD May 17 00:32:49.003732 kernel: audit: type=1334 audit(1747441966.458:83): prog-id=11 op=UNLOAD May 17 00:32:49.003744 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 17 00:32:49.003758 systemd[1]: Populated /etc with preset unit settings. May 17 00:32:49.003785 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:32:49.003802 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:32:49.003816 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:32:49.003830 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 17 00:32:49.003844 systemd[1]: Stopped initrd-switch-root.service. May 17 00:32:49.003858 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 17 00:32:49.003872 systemd[1]: Created slice system-addon\x2dconfig.slice. May 17 00:32:49.003887 systemd[1]: Created slice system-addon\x2drun.slice. May 17 00:32:49.003900 systemd[1]: Created slice system-getty.slice. May 17 00:32:49.003911 systemd[1]: Created slice system-modprobe.slice. May 17 00:32:49.003921 systemd[1]: Created slice system-serial\x2dgetty.slice. May 17 00:32:49.003932 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 17 00:32:49.003947 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 17 00:32:49.003961 systemd[1]: Created slice user.slice. May 17 00:32:49.003974 systemd[1]: Started systemd-ask-password-console.path. May 17 00:32:49.003990 systemd[1]: Started systemd-ask-password-wall.path. May 17 00:32:49.004004 systemd[1]: Set up automount boot.automount. May 17 00:32:49.004030 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 17 00:32:49.004045 systemd[1]: Stopped target initrd-switch-root.target. May 17 00:32:49.004127 systemd[1]: Stopped target initrd-fs.target. May 17 00:32:49.004143 systemd[1]: Stopped target initrd-root-fs.target. May 17 00:32:49.004156 systemd[1]: Reached target integritysetup.target. May 17 00:32:49.004170 systemd[1]: Reached target remote-cryptsetup.target. May 17 00:32:49.004185 systemd[1]: Reached target remote-fs.target. May 17 00:32:49.004200 systemd[1]: Reached target slices.target. May 17 00:32:49.004213 systemd[1]: Reached target swap.target. May 17 00:32:49.004227 systemd[1]: Reached target torcx.target. May 17 00:32:49.004240 systemd[1]: Reached target veritysetup.target. May 17 00:32:49.004256 systemd[1]: Listening on systemd-coredump.socket. May 17 00:32:49.004269 systemd[1]: Listening on systemd-initctl.socket. May 17 00:32:49.004282 systemd[1]: Listening on systemd-networkd.socket. May 17 00:32:49.004293 systemd[1]: Listening on systemd-udevd-control.socket. May 17 00:32:49.004307 systemd[1]: Listening on systemd-udevd-kernel.socket. May 17 00:32:49.004320 systemd[1]: Listening on systemd-userdbd.socket. May 17 00:32:49.004337 systemd[1]: Mounting dev-hugepages.mount... May 17 00:32:49.004350 systemd[1]: Mounting dev-mqueue.mount... May 17 00:32:49.004363 systemd[1]: Mounting media.mount... May 17 00:32:49.004377 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:49.004391 systemd[1]: Mounting sys-kernel-debug.mount... May 17 00:32:49.004404 systemd[1]: Mounting sys-kernel-tracing.mount... May 17 00:32:49.004418 systemd[1]: Mounting tmp.mount... May 17 00:32:49.004432 systemd[1]: Starting flatcar-tmpfiles.service... May 17 00:32:49.004448 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:49.004463 systemd[1]: Starting kmod-static-nodes.service... May 17 00:32:49.004477 systemd[1]: Starting modprobe@configfs.service... May 17 00:32:49.004492 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:49.004506 systemd[1]: Starting modprobe@drm.service... May 17 00:32:49.004520 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:49.004534 systemd[1]: Starting modprobe@fuse.service... May 17 00:32:49.004548 systemd[1]: Starting modprobe@loop.service... May 17 00:32:49.004563 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 17 00:32:49.004580 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 17 00:32:49.004594 systemd[1]: Stopped systemd-fsck-root.service. May 17 00:32:49.004608 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 17 00:32:49.004622 kernel: loop: module loaded May 17 00:32:49.004636 systemd[1]: Stopped systemd-fsck-usr.service. May 17 00:32:49.004650 systemd[1]: Stopped systemd-journald.service. May 17 00:32:49.004665 kernel: fuse: init (API version 7.34) May 17 00:32:49.004679 systemd[1]: Starting systemd-journald.service... May 17 00:32:49.004693 systemd[1]: Starting systemd-modules-load.service... May 17 00:32:49.004707 systemd[1]: Starting systemd-network-generator.service... May 17 00:32:49.004724 systemd[1]: Starting systemd-remount-fs.service... May 17 00:32:49.004739 systemd[1]: Starting systemd-udev-trigger.service... May 17 00:32:49.004754 systemd[1]: verity-setup.service: Deactivated successfully. May 17 00:32:49.004769 systemd[1]: Stopped verity-setup.service. May 17 00:32:49.004796 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:49.004814 systemd-journald[981]: Journal started May 17 00:32:49.004863 systemd-journald[981]: Runtime Journal (/run/log/journal/235d7b52642c4482af8693dd73f39065) is 6.0M, max 48.4M, 42.4M free. May 17 00:32:46.278000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 17 00:32:46.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:32:46.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 17 00:32:46.456000 audit: BPF prog-id=10 op=LOAD May 17 00:32:46.456000 audit: BPF prog-id=10 op=UNLOAD May 17 00:32:46.458000 audit: BPF prog-id=11 op=LOAD May 17 00:32:46.458000 audit: BPF prog-id=11 op=UNLOAD May 17 00:32:46.487000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 17 00:32:46.487000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.487000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:32:46.489000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 17 00:32:46.489000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:46.489000 audit: CWD cwd="/" May 17 00:32:46.489000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:46.489000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:46.489000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 17 00:32:48.865000 audit: BPF prog-id=12 op=LOAD May 17 00:32:48.865000 audit: BPF prog-id=3 op=UNLOAD May 17 00:32:48.865000 audit: BPF prog-id=13 op=LOAD May 17 00:32:48.865000 audit: BPF prog-id=14 op=LOAD May 17 00:32:48.865000 audit: BPF prog-id=4 op=UNLOAD May 17 00:32:48.865000 audit: BPF prog-id=5 op=UNLOAD May 17 00:32:48.866000 audit: BPF prog-id=15 op=LOAD May 17 00:32:48.866000 audit: BPF prog-id=12 op=UNLOAD May 17 00:32:48.866000 audit: BPF prog-id=16 op=LOAD May 17 00:32:48.866000 audit: BPF prog-id=17 op=LOAD May 17 00:32:48.866000 audit: BPF prog-id=13 op=UNLOAD May 17 00:32:48.866000 audit: BPF prog-id=14 op=UNLOAD May 17 00:32:48.867000 audit: BPF prog-id=18 op=LOAD May 17 00:32:48.867000 audit: BPF prog-id=15 op=UNLOAD May 17 00:32:48.867000 audit: BPF prog-id=19 op=LOAD May 17 00:32:48.867000 audit: BPF prog-id=20 op=LOAD May 17 00:32:48.867000 audit: BPF prog-id=16 op=UNLOAD May 17 00:32:48.867000 audit: BPF prog-id=17 op=UNLOAD May 17 00:32:48.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.875000 audit: BPF prog-id=18 op=UNLOAD May 17 00:32:48.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.980000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.983000 audit: BPF prog-id=21 op=LOAD May 17 00:32:48.983000 audit: BPF prog-id=22 op=LOAD May 17 00:32:48.983000 audit: BPF prog-id=23 op=LOAD May 17 00:32:48.983000 audit: BPF prog-id=19 op=UNLOAD May 17 00:32:48.983000 audit: BPF prog-id=20 op=UNLOAD May 17 00:32:49.002000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 17 00:32:49.002000 audit[981]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd3174a5f0 a2=4000 a3=7ffd3174a68c items=0 ppid=1 pid=981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:49.002000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 17 00:32:49.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:48.863938 systemd[1]: Queued start job for default target multi-user.target. May 17 00:32:46.485745 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:32:48.863949 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 17 00:32:46.485980 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:32:48.867566 systemd[1]: systemd-journald.service: Deactivated successfully. May 17 00:32:46.485996 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:32:46.486031 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 17 00:32:46.486041 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="skipped missing lower profile" missing profile=oem May 17 00:32:46.486074 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 17 00:32:46.486085 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 17 00:32:46.486254 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 17 00:32:46.486284 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 17 00:32:46.486296 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 17 00:32:46.486960 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 17 00:32:46.487016 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 17 00:32:46.487059 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 17 00:32:46.487078 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 17 00:32:46.487104 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 17 00:32:46.487123 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 17 00:32:48.600270 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:48.600514 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:48.600599 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:48.600748 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 17 00:32:48.600806 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 17 00:32:48.600857 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2025-05-17T00:32:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 17 00:32:49.009087 systemd[1]: Started systemd-journald.service. May 17 00:32:49.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.010183 systemd[1]: Mounted dev-hugepages.mount. May 17 00:32:49.011031 systemd[1]: Mounted dev-mqueue.mount. May 17 00:32:49.011838 systemd[1]: Mounted media.mount. May 17 00:32:49.012624 systemd[1]: Mounted sys-kernel-debug.mount. May 17 00:32:49.013520 systemd[1]: Mounted sys-kernel-tracing.mount. May 17 00:32:49.014421 systemd[1]: Mounted tmp.mount. May 17 00:32:49.015396 systemd[1]: Finished flatcar-tmpfiles.service. May 17 00:32:49.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.016546 systemd[1]: Finished kmod-static-nodes.service. May 17 00:32:49.017000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.017632 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 17 00:32:49.017785 systemd[1]: Finished modprobe@configfs.service. May 17 00:32:49.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.019050 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:49.019245 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:49.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.020372 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:32:49.020586 systemd[1]: Finished modprobe@drm.service. May 17 00:32:49.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.021686 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:49.021830 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:49.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.022890 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 17 00:32:49.023048 systemd[1]: Finished modprobe@fuse.service. May 17 00:32:49.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.024096 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:49.024194 systemd[1]: Finished modprobe@loop.service. May 17 00:32:49.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.025338 systemd[1]: Finished systemd-modules-load.service. May 17 00:32:49.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.026538 systemd[1]: Finished systemd-network-generator.service. May 17 00:32:49.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.027817 systemd[1]: Finished systemd-remount-fs.service. May 17 00:32:49.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.029064 systemd[1]: Reached target network-pre.target. May 17 00:32:49.030915 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 17 00:32:49.032673 systemd[1]: Mounting sys-kernel-config.mount... May 17 00:32:49.033537 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 17 00:32:49.034716 systemd[1]: Starting systemd-hwdb-update.service... May 17 00:32:49.036605 systemd[1]: Starting systemd-journal-flush.service... May 17 00:32:49.037705 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:49.038627 systemd[1]: Starting systemd-random-seed.service... May 17 00:32:49.039764 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:49.042420 systemd[1]: Starting systemd-sysctl.service... May 17 00:32:49.043308 systemd-journald[981]: Time spent on flushing to /var/log/journal/235d7b52642c4482af8693dd73f39065 is 19.929ms for 1173 entries. May 17 00:32:49.043308 systemd-journald[981]: System Journal (/var/log/journal/235d7b52642c4482af8693dd73f39065) is 8.0M, max 195.6M, 187.6M free. May 17 00:32:49.083055 systemd-journald[981]: Received client request to flush runtime journal. May 17 00:32:49.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.045476 systemd[1]: Starting systemd-sysusers.service... May 17 00:32:49.049871 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 17 00:32:49.084276 udevadm[1008]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 17 00:32:49.051183 systemd[1]: Mounted sys-kernel-config.mount. May 17 00:32:49.052635 systemd[1]: Finished systemd-random-seed.service. May 17 00:32:49.053840 systemd[1]: Reached target first-boot-complete.target. May 17 00:32:49.057289 systemd[1]: Finished systemd-udev-trigger.service. May 17 00:32:49.059264 systemd[1]: Starting systemd-udev-settle.service... May 17 00:32:49.061437 systemd[1]: Finished systemd-sysusers.service. May 17 00:32:49.064578 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 17 00:32:49.068835 systemd[1]: Finished systemd-sysctl.service. May 17 00:32:49.079317 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 17 00:32:49.083891 systemd[1]: Finished systemd-journal-flush.service. May 17 00:32:49.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.472182 systemd[1]: Finished systemd-hwdb-update.service. May 17 00:32:49.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.473000 audit: BPF prog-id=24 op=LOAD May 17 00:32:49.473000 audit: BPF prog-id=25 op=LOAD May 17 00:32:49.473000 audit: BPF prog-id=7 op=UNLOAD May 17 00:32:49.473000 audit: BPF prog-id=8 op=UNLOAD May 17 00:32:49.474409 systemd[1]: Starting systemd-udevd.service... May 17 00:32:49.489241 systemd-udevd[1012]: Using default interface naming scheme 'v252'. May 17 00:32:49.501693 systemd[1]: Started systemd-udevd.service. May 17 00:32:49.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.504000 audit: BPF prog-id=26 op=LOAD May 17 00:32:49.506212 systemd[1]: Starting systemd-networkd.service... May 17 00:32:49.508000 audit: BPF prog-id=27 op=LOAD May 17 00:32:49.509000 audit: BPF prog-id=28 op=LOAD May 17 00:32:49.509000 audit: BPF prog-id=29 op=LOAD May 17 00:32:49.509648 systemd[1]: Starting systemd-userdbd.service... May 17 00:32:49.532881 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 17 00:32:49.537413 systemd[1]: Started systemd-userdbd.service. May 17 00:32:49.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.548151 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 17 00:32:49.569041 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 17 00:32:49.575038 kernel: ACPI: button: Power Button [PWRF] May 17 00:32:49.588794 systemd-networkd[1022]: lo: Link UP May 17 00:32:49.589213 systemd-networkd[1022]: lo: Gained carrier May 17 00:32:49.589728 systemd-networkd[1022]: Enumeration completed May 17 00:32:49.589918 systemd[1]: Started systemd-networkd.service. May 17 00:32:49.590517 systemd-networkd[1022]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 17 00:32:49.591000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.592152 systemd-networkd[1022]: eth0: Link UP May 17 00:32:49.592255 systemd-networkd[1022]: eth0: Gained carrier May 17 00:32:49.585000 audit[1036]: AVC avc: denied { confidentiality } for pid=1036 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 17 00:32:49.585000 audit[1036]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562a45efa4d0 a1=338ac a2=7fbe214a7bc5 a3=5 items=110 ppid=1012 pid=1036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:49.585000 audit: CWD cwd="/" May 17 00:32:49.585000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=1 name=(null) inode=14990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=2 name=(null) inode=14990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=3 name=(null) inode=14991 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=4 name=(null) inode=14990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=5 name=(null) inode=14992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=6 name=(null) inode=14990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=7 name=(null) inode=14993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=8 name=(null) inode=14993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=9 name=(null) inode=14994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=10 name=(null) inode=14993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=11 name=(null) inode=14995 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=12 name=(null) inode=14993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=13 name=(null) inode=14996 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=14 name=(null) inode=14993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=15 name=(null) inode=14997 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=16 name=(null) inode=14993 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=17 name=(null) inode=14998 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=18 name=(null) inode=14990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=19 name=(null) inode=14999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=20 name=(null) inode=14999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=21 name=(null) inode=15000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=22 name=(null) inode=14999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=23 name=(null) inode=15001 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=24 name=(null) inode=14999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=25 name=(null) inode=15002 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=26 name=(null) inode=14999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=27 name=(null) inode=15003 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=28 name=(null) inode=14999 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=29 name=(null) inode=15004 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=30 name=(null) inode=14990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=31 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=32 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=33 name=(null) inode=15006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=34 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=35 name=(null) inode=15007 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=36 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=37 name=(null) inode=15008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=38 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=39 name=(null) inode=15009 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=40 name=(null) inode=15005 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=41 name=(null) inode=15010 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=42 name=(null) inode=14990 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=43 name=(null) inode=15011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=44 name=(null) inode=15011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=45 name=(null) inode=15012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=46 name=(null) inode=15011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=47 name=(null) inode=15013 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=48 name=(null) inode=15011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=49 name=(null) inode=15014 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=50 name=(null) inode=15011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=51 name=(null) inode=15015 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=52 name=(null) inode=15011 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=53 name=(null) inode=15016 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=55 name=(null) inode=15017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=56 name=(null) inode=15017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=57 name=(null) inode=15018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=58 name=(null) inode=15017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=59 name=(null) inode=15019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=60 name=(null) inode=15017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=61 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=62 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=63 name=(null) inode=15021 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=64 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=65 name=(null) inode=15022 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=66 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=67 name=(null) inode=15023 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=68 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=69 name=(null) inode=15024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=70 name=(null) inode=15020 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=71 name=(null) inode=15025 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=72 name=(null) inode=15017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=73 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=74 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=75 name=(null) inode=15027 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=76 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=77 name=(null) inode=15028 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=78 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=79 name=(null) inode=15029 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=80 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=81 name=(null) inode=15030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=82 name=(null) inode=15026 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=83 name=(null) inode=15031 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=84 name=(null) inode=15017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=85 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=86 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=87 name=(null) inode=15033 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=88 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=89 name=(null) inode=15034 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=90 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=91 name=(null) inode=15035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=92 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=93 name=(null) inode=15036 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=94 name=(null) inode=15032 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=95 name=(null) inode=15037 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=96 name=(null) inode=15017 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=97 name=(null) inode=15038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=98 name=(null) inode=15038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=99 name=(null) inode=15039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=100 name=(null) inode=15038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=101 name=(null) inode=15040 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=102 name=(null) inode=15038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=103 name=(null) inode=15041 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=104 name=(null) inode=15038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=105 name=(null) inode=15042 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=106 name=(null) inode=15038 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=107 name=(null) inode=15043 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PATH item=109 name=(null) inode=15044 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:32:49.585000 audit: PROCTITLE proctitle="(udev-worker)" May 17 00:32:49.603366 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 17 00:32:49.605670 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 17 00:32:49.605809 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 17 00:32:49.605941 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 17 00:32:49.609186 systemd-networkd[1022]: eth0: DHCPv4 address 10.0.0.99/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 17 00:32:49.614033 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 17 00:32:49.627049 kernel: mousedev: PS/2 mouse device common for all mice May 17 00:32:49.677520 kernel: kvm: Nested Virtualization enabled May 17 00:32:49.677614 kernel: SVM: kvm: Nested Paging enabled May 17 00:32:49.677634 kernel: SVM: Virtual VMLOAD VMSAVE supported May 17 00:32:49.677646 kernel: SVM: Virtual GIF supported May 17 00:32:49.695054 kernel: EDAC MC: Ver: 3.0.0 May 17 00:32:49.721443 systemd[1]: Finished systemd-udev-settle.service. May 17 00:32:49.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.723386 systemd[1]: Starting lvm2-activation-early.service... May 17 00:32:49.730954 lvm[1049]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:32:49.758182 systemd[1]: Finished lvm2-activation-early.service. May 17 00:32:49.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.759475 systemd[1]: Reached target cryptsetup.target. May 17 00:32:49.761851 systemd[1]: Starting lvm2-activation.service... May 17 00:32:49.765378 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 17 00:32:49.789156 systemd[1]: Finished lvm2-activation.service. May 17 00:32:49.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.790274 systemd[1]: Reached target local-fs-pre.target. May 17 00:32:49.791211 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 17 00:32:49.791244 systemd[1]: Reached target local-fs.target. May 17 00:32:49.792122 systemd[1]: Reached target machines.target. May 17 00:32:49.794358 systemd[1]: Starting ldconfig.service... May 17 00:32:49.795537 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:49.795606 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:49.796785 systemd[1]: Starting systemd-boot-update.service... May 17 00:32:49.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.798447 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 17 00:32:49.800270 systemd[1]: Starting systemd-machine-id-commit.service... May 17 00:32:49.802237 systemd[1]: Starting systemd-sysext.service... May 17 00:32:49.803401 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1052 (bootctl) May 17 00:32:49.804178 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 17 00:32:49.810283 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 17 00:32:49.813121 systemd[1]: Unmounting usr-share-oem.mount... May 17 00:32:49.817237 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 17 00:32:49.817427 systemd[1]: Unmounted usr-share-oem.mount. May 17 00:32:49.831052 kernel: loop0: detected capacity change from 0 to 221472 May 17 00:32:49.870050 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) May 17 00:32:49.870050 systemd-fsck[1060]: /dev/vda1: 791 files, 120746/258078 clusters May 17 00:32:49.871565 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 17 00:32:49.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:49.874442 systemd[1]: Mounting boot.mount... May 17 00:32:49.887549 systemd[1]: Mounted boot.mount. May 17 00:32:50.041009 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 17 00:32:50.041501 systemd[1]: Finished systemd-machine-id-commit.service. May 17 00:32:50.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.042984 systemd[1]: Finished systemd-boot-update.service. May 17 00:32:50.044053 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 17 00:32:50.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.068036 kernel: loop1: detected capacity change from 0 to 221472 May 17 00:32:50.071993 (sd-sysext)[1065]: Using extensions 'kubernetes'. May 17 00:32:50.072298 (sd-sysext)[1065]: Merged extensions into '/usr'. May 17 00:32:50.086981 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.088474 systemd[1]: Mounting usr-share-oem.mount... May 17 00:32:50.089727 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:50.091006 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:50.092984 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:50.097640 systemd[1]: Starting modprobe@loop.service... May 17 00:32:50.098647 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:50.098793 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:50.098897 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.101282 systemd[1]: Mounted usr-share-oem.mount. May 17 00:32:50.102453 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:50.102557 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:50.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.103996 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:50.104110 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:50.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.105936 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:50.106111 systemd[1]: Finished modprobe@loop.service. May 17 00:32:50.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.107000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.107796 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:50.107888 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:50.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.109093 systemd[1]: Finished systemd-sysext.service. May 17 00:32:50.111504 systemd[1]: Starting ensure-sysext.service... May 17 00:32:50.113608 systemd[1]: Starting systemd-tmpfiles-setup.service... May 17 00:32:50.119210 systemd[1]: Reloading. May 17 00:32:50.123694 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 17 00:32:50.124320 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 17 00:32:50.125759 systemd-tmpfiles[1072]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 17 00:32:50.127095 ldconfig[1051]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 17 00:32:50.173066 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2025-05-17T00:32:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:32:50.173391 /usr/lib/systemd/system-generators/torcx-generator[1091]: time="2025-05-17T00:32:50Z" level=info msg="torcx already run" May 17 00:32:50.224544 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:32:50.224561 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:32:50.240966 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:32:50.290000 audit: BPF prog-id=30 op=LOAD May 17 00:32:50.290000 audit: BPF prog-id=26 op=UNLOAD May 17 00:32:50.291000 audit: BPF prog-id=31 op=LOAD May 17 00:32:50.291000 audit: BPF prog-id=32 op=LOAD May 17 00:32:50.291000 audit: BPF prog-id=24 op=UNLOAD May 17 00:32:50.291000 audit: BPF prog-id=25 op=UNLOAD May 17 00:32:50.292000 audit: BPF prog-id=33 op=LOAD May 17 00:32:50.292000 audit: BPF prog-id=21 op=UNLOAD May 17 00:32:50.292000 audit: BPF prog-id=34 op=LOAD May 17 00:32:50.293000 audit: BPF prog-id=35 op=LOAD May 17 00:32:50.293000 audit: BPF prog-id=22 op=UNLOAD May 17 00:32:50.293000 audit: BPF prog-id=23 op=UNLOAD May 17 00:32:50.293000 audit: BPF prog-id=36 op=LOAD May 17 00:32:50.293000 audit: BPF prog-id=27 op=UNLOAD May 17 00:32:50.293000 audit: BPF prog-id=37 op=LOAD May 17 00:32:50.293000 audit: BPF prog-id=38 op=LOAD May 17 00:32:50.293000 audit: BPF prog-id=28 op=UNLOAD May 17 00:32:50.293000 audit: BPF prog-id=29 op=UNLOAD May 17 00:32:50.296007 systemd[1]: Finished ldconfig.service. May 17 00:32:50.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.297750 systemd[1]: Finished systemd-tmpfiles-setup.service. May 17 00:32:50.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.301109 systemd[1]: Starting audit-rules.service... May 17 00:32:50.302895 systemd[1]: Starting clean-ca-certificates.service... May 17 00:32:50.304822 systemd[1]: Starting systemd-journal-catalog-update.service... May 17 00:32:50.306000 audit: BPF prog-id=39 op=LOAD May 17 00:32:50.307424 systemd[1]: Starting systemd-resolved.service... May 17 00:32:50.308000 audit: BPF prog-id=40 op=LOAD May 17 00:32:50.309512 systemd[1]: Starting systemd-timesyncd.service... May 17 00:32:50.311235 systemd[1]: Starting systemd-update-utmp.service... May 17 00:32:50.312550 systemd[1]: Finished clean-ca-certificates.service. May 17 00:32:50.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.315424 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:50.316000 audit[1144]: SYSTEM_BOOT pid=1144 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 17 00:32:50.320859 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.321093 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:50.322515 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:50.324363 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:50.326229 systemd[1]: Starting modprobe@loop.service... May 17 00:32:50.327193 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:50.327291 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:50.327374 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:50.327442 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.328536 systemd[1]: Finished systemd-journal-catalog-update.service. May 17 00:32:50.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.329888 systemd[1]: Finished systemd-update-utmp.service. May 17 00:32:50.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.331130 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:50.331224 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:50.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.332403 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:50.332498 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:50.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.333000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:50.333864 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:50.334000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 17 00:32:50.334000 audit[1156]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff51c450a0 a2=420 a3=0 items=0 ppid=1133 pid=1156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:50.334000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 17 00:32:50.334326 augenrules[1156]: No rules May 17 00:32:50.334184 systemd[1]: Finished modprobe@loop.service. May 17 00:32:50.335350 systemd[1]: Finished audit-rules.service. May 17 00:32:50.337183 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:50.337277 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:50.338461 systemd[1]: Starting systemd-update-done.service... May 17 00:32:50.340530 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.340696 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:50.343567 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:50.345611 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:50.347565 systemd[1]: Starting modprobe@loop.service... May 17 00:32:50.348382 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:50.348479 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:50.348556 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:50.348620 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.349398 systemd[1]: Finished systemd-update-done.service. May 17 00:32:50.350686 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:50.350795 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:50.352069 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:50.352180 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:50.353575 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:50.353713 systemd[1]: Finished modprobe@loop.service. May 17 00:32:50.355062 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:50.355176 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:50.357624 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.357819 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 17 00:32:50.359159 systemd[1]: Starting modprobe@dm_mod.service... May 17 00:32:50.361126 systemd[1]: Starting modprobe@drm.service... May 17 00:32:50.363253 systemd[1]: Starting modprobe@efi_pstore.service... May 17 00:32:50.365229 systemd[1]: Starting modprobe@loop.service... May 17 00:32:50.366115 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 17 00:32:50.366350 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:50.822895 systemd-timesyncd[1143]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 17 00:32:50.823223 systemd-timesyncd[1143]: Initial clock synchronization to Sat 2025-05-17 00:32:50.822834 UTC. May 17 00:32:50.823603 systemd-resolved[1141]: Positive Trust Anchors: May 17 00:32:50.823612 systemd-resolved[1141]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 17 00:32:50.823649 systemd-resolved[1141]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 17 00:32:50.823743 systemd[1]: Starting systemd-networkd-wait-online.service... May 17 00:32:50.824959 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 17 00:32:50.825064 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 17 00:32:50.825866 systemd[1]: Started systemd-timesyncd.service. May 17 00:32:50.827603 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 17 00:32:50.827707 systemd[1]: Finished modprobe@dm_mod.service. May 17 00:32:50.828881 systemd[1]: modprobe@drm.service: Deactivated successfully. May 17 00:32:50.828973 systemd[1]: Finished modprobe@drm.service. May 17 00:32:50.830098 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 17 00:32:50.830195 systemd[1]: Finished modprobe@efi_pstore.service. May 17 00:32:50.831359 systemd[1]: modprobe@loop.service: Deactivated successfully. May 17 00:32:50.831451 systemd[1]: Finished modprobe@loop.service. May 17 00:32:50.832844 systemd[1]: Reached target time-set.target. May 17 00:32:50.833779 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 17 00:32:50.833808 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 17 00:32:50.834052 systemd[1]: Finished ensure-sysext.service. May 17 00:32:50.836370 systemd-resolved[1141]: Defaulting to hostname 'linux'. May 17 00:32:50.837686 systemd[1]: Started systemd-resolved.service. May 17 00:32:50.838649 systemd[1]: Reached target network.target. May 17 00:32:50.839456 systemd[1]: Reached target nss-lookup.target. May 17 00:32:50.840359 systemd[1]: Reached target sysinit.target. May 17 00:32:50.841216 systemd[1]: Started motdgen.path. May 17 00:32:50.841961 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 17 00:32:50.843238 systemd[1]: Started logrotate.timer. May 17 00:32:50.844052 systemd[1]: Started mdadm.timer. May 17 00:32:50.844742 systemd[1]: Started systemd-tmpfiles-clean.timer. May 17 00:32:50.845616 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 17 00:32:50.845639 systemd[1]: Reached target paths.target. May 17 00:32:50.846444 systemd[1]: Reached target timers.target. May 17 00:32:50.847460 systemd[1]: Listening on dbus.socket. May 17 00:32:50.848999 systemd[1]: Starting docker.socket... May 17 00:32:50.851806 systemd[1]: Listening on sshd.socket. May 17 00:32:50.852668 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:50.852985 systemd[1]: Listening on docker.socket. May 17 00:32:50.853841 systemd[1]: Reached target sockets.target. May 17 00:32:50.854642 systemd[1]: Reached target basic.target. May 17 00:32:50.855476 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:32:50.855498 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 17 00:32:50.856370 systemd[1]: Starting containerd.service... May 17 00:32:50.858068 systemd[1]: Starting dbus.service... May 17 00:32:50.859643 systemd[1]: Starting enable-oem-cloudinit.service... May 17 00:32:50.861464 systemd[1]: Starting extend-filesystems.service... May 17 00:32:50.862406 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 17 00:32:50.863291 systemd[1]: Starting motdgen.service... May 17 00:32:50.864983 systemd[1]: Starting prepare-helm.service... May 17 00:32:50.866937 jq[1176]: false May 17 00:32:50.866565 systemd[1]: Starting ssh-key-proc-cmdline.service... May 17 00:32:50.868277 systemd[1]: Starting sshd-keygen.service... May 17 00:32:50.871291 systemd[1]: Starting systemd-logind.service... May 17 00:32:50.872246 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 17 00:32:50.872289 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 17 00:32:50.872585 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 17 00:32:50.873126 systemd[1]: Starting update-engine.service... May 17 00:32:50.876065 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 17 00:32:50.884060 jq[1193]: true May 17 00:32:50.879363 dbus-daemon[1175]: [system] SELinux support is enabled May 17 00:32:50.880353 systemd[1]: Started dbus.service. May 17 00:32:50.883173 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 17 00:32:50.883294 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 17 00:32:50.884249 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 17 00:32:50.884402 systemd[1]: Finished ssh-key-proc-cmdline.service. May 17 00:32:50.885689 systemd[1]: motdgen.service: Deactivated successfully. May 17 00:32:50.885822 systemd[1]: Finished motdgen.service. May 17 00:32:50.890585 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 17 00:32:50.895589 extend-filesystems[1177]: Found loop1 May 17 00:32:50.895589 extend-filesystems[1177]: Found sr0 May 17 00:32:50.895589 extend-filesystems[1177]: Found vda May 17 00:32:50.895589 extend-filesystems[1177]: Found vda1 May 17 00:32:50.895589 extend-filesystems[1177]: Found vda2 May 17 00:32:50.895589 extend-filesystems[1177]: Found vda3 May 17 00:32:50.895589 extend-filesystems[1177]: Found usr May 17 00:32:50.895589 extend-filesystems[1177]: Found vda4 May 17 00:32:50.895589 extend-filesystems[1177]: Found vda6 May 17 00:32:50.895589 extend-filesystems[1177]: Found vda7 May 17 00:32:50.895589 extend-filesystems[1177]: Found vda9 May 17 00:32:50.895589 extend-filesystems[1177]: Checking size of /dev/vda9 May 17 00:32:50.910130 jq[1199]: true May 17 00:32:50.890612 systemd[1]: Reached target system-config.target. May 17 00:32:50.910309 tar[1196]: linux-amd64/helm May 17 00:32:50.891525 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 17 00:32:50.891539 systemd[1]: Reached target user-config.target. May 17 00:32:50.919369 extend-filesystems[1177]: Resized partition /dev/vda9 May 17 00:32:50.923292 extend-filesystems[1225]: resize2fs 1.46.5 (30-Dec-2021) May 17 00:32:50.930042 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 17 00:32:50.936395 update_engine[1191]: I0517 00:32:50.936210 1191 main.cc:92] Flatcar Update Engine starting May 17 00:32:50.938280 systemd[1]: Started update-engine.service. May 17 00:32:50.938374 update_engine[1191]: I0517 00:32:50.938333 1191 update_check_scheduler.cc:74] Next update check in 5m12s May 17 00:32:50.969720 systemd[1]: Started locksmithd.service. May 17 00:32:50.977402 systemd-logind[1188]: Watching system buttons on /dev/input/event1 (Power Button) May 17 00:32:50.977425 systemd-logind[1188]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 17 00:32:50.981067 env[1200]: time="2025-05-17T00:32:50.979273111Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 17 00:32:50.981212 systemd-logind[1188]: New seat seat0. May 17 00:32:50.985904 systemd[1]: Started systemd-logind.service. May 17 00:32:50.989331 bash[1222]: Updated "/home/core/.ssh/authorized_keys" May 17 00:32:50.988910 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 17 00:32:50.992126 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 17 00:32:51.020640 env[1200]: time="2025-05-17T00:32:51.009919256Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 17 00:32:51.021226 env[1200]: time="2025-05-17T00:32:51.020958000Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:51.022507 extend-filesystems[1225]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 17 00:32:51.022507 extend-filesystems[1225]: old_desc_blocks = 1, new_desc_blocks = 1 May 17 00:32:51.022507 extend-filesystems[1225]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 17 00:32:51.022248 systemd[1]: extend-filesystems.service: Deactivated successfully. May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.023116741Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.023161685Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.023567376Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.023590800Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.023625956Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.023639662Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.023752534Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.024122748Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.024311282Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 17 00:32:51.029203 env[1200]: time="2025-05-17T00:32:51.024331530Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 17 00:32:51.029445 extend-filesystems[1177]: Resized filesystem in /dev/vda9 May 17 00:32:51.022440 systemd[1]: Finished extend-filesystems.service. May 17 00:32:51.030709 env[1200]: time="2025-05-17T00:32:51.024402694Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 17 00:32:51.030709 env[1200]: time="2025-05-17T00:32:51.024438701Z" level=info msg="metadata content store policy set" policy=shared May 17 00:32:51.031344 env[1200]: time="2025-05-17T00:32:51.031319843Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 17 00:32:51.031440 env[1200]: time="2025-05-17T00:32:51.031418909Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 17 00:32:51.031538 env[1200]: time="2025-05-17T00:32:51.031516612Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 17 00:32:51.031654 env[1200]: time="2025-05-17T00:32:51.031631598Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 17 00:32:51.031773 env[1200]: time="2025-05-17T00:32:51.031749920Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 17 00:32:51.031865 env[1200]: time="2025-05-17T00:32:51.031843846Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 17 00:32:51.031956 env[1200]: time="2025-05-17T00:32:51.031934807Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 17 00:32:51.032070 env[1200]: time="2025-05-17T00:32:51.032049192Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 17 00:32:51.032163 env[1200]: time="2025-05-17T00:32:51.032141084Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 17 00:32:51.032258 env[1200]: time="2025-05-17T00:32:51.032236333Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 17 00:32:51.032349 env[1200]: time="2025-05-17T00:32:51.032327013Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 17 00:32:51.032440 env[1200]: time="2025-05-17T00:32:51.032418014Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 17 00:32:51.032652 env[1200]: time="2025-05-17T00:32:51.032633558Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 17 00:32:51.032837 env[1200]: time="2025-05-17T00:32:51.032816892Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 17 00:32:51.033229 env[1200]: time="2025-05-17T00:32:51.033191726Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 17 00:32:51.033280 env[1200]: time="2025-05-17T00:32:51.033240928Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033280 env[1200]: time="2025-05-17T00:32:51.033254904Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 17 00:32:51.033338 env[1200]: time="2025-05-17T00:32:51.033304157Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033338 env[1200]: time="2025-05-17T00:32:51.033315858Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033338 env[1200]: time="2025-05-17T00:32:51.033329143Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033338 env[1200]: time="2025-05-17T00:32:51.033339453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033448 env[1200]: time="2025-05-17T00:32:51.033350554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033448 env[1200]: time="2025-05-17T00:32:51.033361925Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033448 env[1200]: time="2025-05-17T00:32:51.033374108Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033448 env[1200]: time="2025-05-17T00:32:51.033384628Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033448 env[1200]: time="2025-05-17T00:32:51.033397361Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 17 00:32:51.033581 env[1200]: time="2025-05-17T00:32:51.033522606Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033581 env[1200]: time="2025-05-17T00:32:51.033536242Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033581 env[1200]: time="2025-05-17T00:32:51.033546972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033581 env[1200]: time="2025-05-17T00:32:51.033557031Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 17 00:32:51.033581 env[1200]: time="2025-05-17T00:32:51.033570727Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 17 00:32:51.033581 env[1200]: time="2025-05-17T00:32:51.033581297Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 17 00:32:51.033738 env[1200]: time="2025-05-17T00:32:51.033598349Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 17 00:32:51.033738 env[1200]: time="2025-05-17T00:32:51.033632182Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 17 00:32:51.033858 env[1200]: time="2025-05-17T00:32:51.033814053Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 17 00:32:51.034535 env[1200]: time="2025-05-17T00:32:51.033863045Z" level=info msg="Connect containerd service" May 17 00:32:51.034535 env[1200]: time="2025-05-17T00:32:51.033894384Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 17 00:32:51.034685 env[1200]: time="2025-05-17T00:32:51.034662375Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:32:51.034808 env[1200]: time="2025-05-17T00:32:51.034774966Z" level=info msg="Start subscribing containerd event" May 17 00:32:51.034858 env[1200]: time="2025-05-17T00:32:51.034821193Z" level=info msg="Start recovering state" May 17 00:32:51.034889 env[1200]: time="2025-05-17T00:32:51.034867981Z" level=info msg="Start event monitor" May 17 00:32:51.034889 env[1200]: time="2025-05-17T00:32:51.034878160Z" level=info msg="Start snapshots syncer" May 17 00:32:51.034889 env[1200]: time="2025-05-17T00:32:51.034885344Z" level=info msg="Start cni network conf syncer for default" May 17 00:32:51.034977 env[1200]: time="2025-05-17T00:32:51.034892216Z" level=info msg="Start streaming server" May 17 00:32:51.035180 env[1200]: time="2025-05-17T00:32:51.035140041Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 17 00:32:51.035180 env[1200]: time="2025-05-17T00:32:51.035176199Z" level=info msg=serving... address=/run/containerd/containerd.sock May 17 00:32:51.035292 systemd[1]: Started containerd.service. May 17 00:32:51.037797 env[1200]: time="2025-05-17T00:32:51.035563486Z" level=info msg="containerd successfully booted in 0.094444s" May 17 00:32:51.047797 locksmithd[1227]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 17 00:32:51.134289 sshd_keygen[1198]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 17 00:32:51.151321 systemd[1]: Finished sshd-keygen.service. May 17 00:32:51.153446 systemd[1]: Starting issuegen.service... May 17 00:32:51.157631 systemd[1]: issuegen.service: Deactivated successfully. May 17 00:32:51.157757 systemd[1]: Finished issuegen.service. May 17 00:32:51.159569 systemd[1]: Starting systemd-user-sessions.service... May 17 00:32:51.164292 systemd[1]: Finished systemd-user-sessions.service. May 17 00:32:51.166219 systemd[1]: Started getty@tty1.service. May 17 00:32:51.167904 systemd[1]: Started serial-getty@ttyS0.service. May 17 00:32:51.168882 systemd[1]: Reached target getty.target. May 17 00:32:51.361074 tar[1196]: linux-amd64/LICENSE May 17 00:32:51.361074 tar[1196]: linux-amd64/README.md May 17 00:32:51.365237 systemd[1]: Finished prepare-helm.service. May 17 00:32:51.770176 systemd-networkd[1022]: eth0: Gained IPv6LL May 17 00:32:51.771832 systemd[1]: Finished systemd-networkd-wait-online.service. May 17 00:32:51.773195 systemd[1]: Reached target network-online.target. May 17 00:32:51.775427 systemd[1]: Starting kubelet.service... May 17 00:32:52.660835 systemd[1]: Started kubelet.service. May 17 00:32:52.662670 systemd[1]: Reached target multi-user.target. May 17 00:32:52.664907 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 17 00:32:52.671204 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 17 00:32:52.671327 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 17 00:32:52.672387 systemd[1]: Startup finished in 621ms (kernel) + 4.545s (initrd) + 5.977s (userspace) = 11.143s. May 17 00:32:53.261993 kubelet[1257]: E0517 00:32:53.261931 1257 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:32:53.263816 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:32:53.263939 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:32:53.264197 systemd[1]: kubelet.service: Consumed 1.380s CPU time. May 17 00:32:54.542064 systemd[1]: Created slice system-sshd.slice. May 17 00:32:54.543152 systemd[1]: Started sshd@0-10.0.0.99:22-10.0.0.1:54890.service. May 17 00:32:54.584806 sshd[1266]: Accepted publickey for core from 10.0.0.1 port 54890 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:32:54.586136 sshd[1266]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:54.593021 systemd[1]: Created slice user-500.slice. May 17 00:32:54.593945 systemd[1]: Starting user-runtime-dir@500.service... May 17 00:32:54.595558 systemd-logind[1188]: New session 1 of user core. May 17 00:32:54.608954 systemd[1]: Finished user-runtime-dir@500.service. May 17 00:32:54.610239 systemd[1]: Starting user@500.service... May 17 00:32:54.612574 (systemd)[1269]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:54.679153 systemd[1269]: Queued start job for default target default.target. May 17 00:32:54.679516 systemd[1269]: Reached target paths.target. May 17 00:32:54.679533 systemd[1269]: Reached target sockets.target. May 17 00:32:54.679544 systemd[1269]: Reached target timers.target. May 17 00:32:54.679554 systemd[1269]: Reached target basic.target. May 17 00:32:54.679587 systemd[1269]: Reached target default.target. May 17 00:32:54.679606 systemd[1269]: Startup finished in 62ms. May 17 00:32:54.679654 systemd[1]: Started user@500.service. May 17 00:32:54.680491 systemd[1]: Started session-1.scope. May 17 00:32:54.743099 systemd[1]: Started sshd@1-10.0.0.99:22-10.0.0.1:54904.service. May 17 00:32:54.784437 sshd[1278]: Accepted publickey for core from 10.0.0.1 port 54904 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:32:54.785949 sshd[1278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:54.789327 systemd-logind[1188]: New session 2 of user core. May 17 00:32:54.790285 systemd[1]: Started session-2.scope. May 17 00:32:54.843133 sshd[1278]: pam_unix(sshd:session): session closed for user core May 17 00:32:54.846685 systemd[1]: Started sshd@2-10.0.0.99:22-10.0.0.1:54920.service. May 17 00:32:54.872701 systemd[1]: sshd@1-10.0.0.99:22-10.0.0.1:54904.service: Deactivated successfully. May 17 00:32:54.873531 systemd[1]: session-2.scope: Deactivated successfully. May 17 00:32:54.874068 systemd-logind[1188]: Session 2 logged out. Waiting for processes to exit. May 17 00:32:54.874853 systemd-logind[1188]: Removed session 2. May 17 00:32:54.909603 sshd[1283]: Accepted publickey for core from 10.0.0.1 port 54920 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:32:54.910617 sshd[1283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:54.913668 systemd-logind[1188]: New session 3 of user core. May 17 00:32:54.914435 systemd[1]: Started session-3.scope. May 17 00:32:54.963670 sshd[1283]: pam_unix(sshd:session): session closed for user core May 17 00:32:54.966537 systemd[1]: sshd@2-10.0.0.99:22-10.0.0.1:54920.service: Deactivated successfully. May 17 00:32:54.967021 systemd[1]: session-3.scope: Deactivated successfully. May 17 00:32:54.967483 systemd-logind[1188]: Session 3 logged out. Waiting for processes to exit. May 17 00:32:54.968485 systemd[1]: Started sshd@3-10.0.0.99:22-10.0.0.1:54936.service. May 17 00:32:54.969206 systemd-logind[1188]: Removed session 3. May 17 00:32:55.007791 sshd[1290]: Accepted publickey for core from 10.0.0.1 port 54936 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:32:55.009140 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:55.012920 systemd-logind[1188]: New session 4 of user core. May 17 00:32:55.013849 systemd[1]: Started session-4.scope. May 17 00:32:55.068311 sshd[1290]: pam_unix(sshd:session): session closed for user core May 17 00:32:55.070903 systemd[1]: sshd@3-10.0.0.99:22-10.0.0.1:54936.service: Deactivated successfully. May 17 00:32:55.071508 systemd[1]: session-4.scope: Deactivated successfully. May 17 00:32:55.072020 systemd-logind[1188]: Session 4 logged out. Waiting for processes to exit. May 17 00:32:55.073403 systemd[1]: Started sshd@4-10.0.0.99:22-10.0.0.1:54938.service. May 17 00:32:55.074201 systemd-logind[1188]: Removed session 4. May 17 00:32:55.113073 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 54938 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:32:55.114233 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:55.117551 systemd-logind[1188]: New session 5 of user core. May 17 00:32:55.118310 systemd[1]: Started session-5.scope. May 17 00:32:55.172714 sudo[1299]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 17 00:32:55.172895 sudo[1299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:55.180240 dbus-daemon[1175]: \xd0=\u00087dU: received setenforce notice (enforcing=-2112294416) May 17 00:32:55.182005 sudo[1299]: pam_unix(sudo:session): session closed for user root May 17 00:32:55.183524 sshd[1296]: pam_unix(sshd:session): session closed for user core May 17 00:32:55.186168 systemd[1]: sshd@4-10.0.0.99:22-10.0.0.1:54938.service: Deactivated successfully. May 17 00:32:55.186671 systemd[1]: session-5.scope: Deactivated successfully. May 17 00:32:55.187161 systemd-logind[1188]: Session 5 logged out. Waiting for processes to exit. May 17 00:32:55.188120 systemd[1]: Started sshd@5-10.0.0.99:22-10.0.0.1:54944.service. May 17 00:32:55.188961 systemd-logind[1188]: Removed session 5. May 17 00:32:55.227380 sshd[1303]: Accepted publickey for core from 10.0.0.1 port 54944 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:32:55.228312 sshd[1303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:55.231489 systemd-logind[1188]: New session 6 of user core. May 17 00:32:55.232248 systemd[1]: Started session-6.scope. May 17 00:32:55.284058 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 17 00:32:55.284244 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:55.286777 sudo[1307]: pam_unix(sudo:session): session closed for user root May 17 00:32:55.290904 sudo[1306]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 17 00:32:55.291125 sudo[1306]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:55.298602 systemd[1]: Stopping audit-rules.service... May 17 00:32:55.298000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:32:55.299866 auditctl[1310]: No rules May 17 00:32:55.300150 systemd[1]: audit-rules.service: Deactivated successfully. May 17 00:32:55.300315 systemd[1]: Stopped audit-rules.service. May 17 00:32:55.300579 kernel: kauditd_printk_skb: 241 callbacks suppressed May 17 00:32:55.300618 kernel: audit: type=1305 audit(1747441975.298:201): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 17 00:32:55.298000 audit[1310]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc81194f0 a2=420 a3=0 items=0 ppid=1 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:55.302889 systemd[1]: Starting audit-rules.service... May 17 00:32:55.306877 kernel: audit: type=1300 audit(1747441975.298:201): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc81194f0 a2=420 a3=0 items=0 ppid=1 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:55.306966 kernel: audit: type=1327 audit(1747441975.298:201): proctitle=2F7362696E2F617564697463746C002D44 May 17 00:32:55.298000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 17 00:32:55.308150 kernel: audit: type=1131 audit(1747441975.298:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:55.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:55.318289 augenrules[1327]: No rules May 17 00:32:55.318751 systemd[1]: Finished audit-rules.service. May 17 00:32:55.319637 sudo[1306]: pam_unix(sudo:session): session closed for user root May 17 00:32:55.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:55.318000 audit[1306]: USER_END pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:55.323588 sshd[1303]: pam_unix(sshd:session): session closed for user core May 17 00:32:55.325930 systemd[1]: sshd@5-10.0.0.99:22-10.0.0.1:54944.service: Deactivated successfully. May 17 00:32:55.326574 systemd[1]: session-6.scope: Deactivated successfully. May 17 00:32:55.326848 kernel: audit: type=1130 audit(1747441975.317:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:55.326874 kernel: audit: type=1106 audit(1747441975.318:204): pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:55.318000 audit[1306]: CRED_DISP pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:55.327123 systemd-logind[1188]: Session 6 logged out. Waiting for processes to exit. May 17 00:32:55.330180 kernel: audit: type=1104 audit(1747441975.318:205): pid=1306 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:55.330221 kernel: audit: type=1106 audit(1747441975.322:206): pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.322000 audit[1303]: USER_END pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.332981 systemd[1]: Started sshd@6-10.0.0.99:22-10.0.0.1:54960.service. May 17 00:32:55.333346 systemd-logind[1188]: Removed session 6. May 17 00:32:55.322000 audit[1303]: CRED_DISP pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.337801 kernel: audit: type=1104 audit(1747441975.322:207): pid=1303 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.337835 kernel: audit: type=1131 audit(1747441975.322:208): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.99:22-10.0.0.1:54944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:55.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.99:22-10.0.0.1:54944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:55.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.99:22-10.0.0.1:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:55.372000 audit[1333]: USER_ACCT pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.373487 sshd[1333]: Accepted publickey for core from 10.0.0.1 port 54960 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:32:55.373000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.373000 audit[1333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffccb8b430 a2=3 a3=0 items=0 ppid=1 pid=1333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:55.373000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:32:55.374419 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:32:55.377663 systemd-logind[1188]: New session 7 of user core. May 17 00:32:55.378398 systemd[1]: Started session-7.scope. May 17 00:32:55.380000 audit[1333]: USER_START pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.381000 audit[1335]: CRED_ACQ pid=1335 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:32:55.428000 audit[1336]: USER_ACCT pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:55.428000 audit[1336]: CRED_REFR pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:55.429241 sudo[1336]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 17 00:32:55.429412 sudo[1336]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 17 00:32:55.429000 audit[1336]: USER_START pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:32:55.450685 systemd[1]: Starting docker.service... May 17 00:32:55.498010 env[1348]: time="2025-05-17T00:32:55.497932822Z" level=info msg="Starting up" May 17 00:32:55.499741 env[1348]: time="2025-05-17T00:32:55.499686813Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:32:55.499741 env[1348]: time="2025-05-17T00:32:55.499705488Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:32:55.499741 env[1348]: time="2025-05-17T00:32:55.499729313Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:32:55.499741 env[1348]: time="2025-05-17T00:32:55.499748850Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:32:55.501664 env[1348]: time="2025-05-17T00:32:55.501632073Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 17 00:32:55.501664 env[1348]: time="2025-05-17T00:32:55.501661990Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 17 00:32:55.501739 env[1348]: time="2025-05-17T00:32:55.501680454Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 17 00:32:55.501739 env[1348]: time="2025-05-17T00:32:55.501688068Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 17 00:32:55.997999 env[1348]: time="2025-05-17T00:32:55.997942144Z" level=info msg="Loading containers: start." May 17 00:32:56.051000 audit[1383]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1383 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.051000 audit[1383]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe192b6e20 a2=0 a3=7ffe192b6e0c items=0 ppid=1348 pid=1383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.051000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 17 00:32:56.052000 audit[1385]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.052000 audit[1385]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe6199d100 a2=0 a3=7ffe6199d0ec items=0 ppid=1348 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.052000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 17 00:32:56.054000 audit[1387]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.054000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff84aeb810 a2=0 a3=7fff84aeb7fc items=0 ppid=1348 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.054000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:32:56.055000 audit[1389]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.055000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcf59d0f80 a2=0 a3=7ffcf59d0f6c items=0 ppid=1348 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.055000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:32:56.057000 audit[1391]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.057000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd67220790 a2=0 a3=7ffd6722077c items=0 ppid=1348 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.057000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 17 00:32:56.075000 audit[1396]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.075000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff2e0c2b10 a2=0 a3=7fff2e0c2afc items=0 ppid=1348 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 17 00:32:56.084000 audit[1398]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.084000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe77d744a0 a2=0 a3=7ffe77d7448c items=0 ppid=1348 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.084000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 17 00:32:56.085000 audit[1400]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.085000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd92a93670 a2=0 a3=7ffd92a9365c items=0 ppid=1348 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.085000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 17 00:32:56.088000 audit[1402]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.088000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffea412e8d0 a2=0 a3=7ffea412e8bc items=0 ppid=1348 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.088000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:56.096000 audit[1406]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.096000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffcfc068440 a2=0 a3=7ffcfc06842c items=0 ppid=1348 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.096000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:56.100000 audit[1407]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.100000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeb0554d20 a2=0 a3=7ffeb0554d0c items=0 ppid=1348 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:56.111048 kernel: Initializing XFRM netlink socket May 17 00:32:56.142691 env[1348]: time="2025-05-17T00:32:56.142644758Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 17 00:32:56.174000 audit[1415]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.174000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd5fbbbf40 a2=0 a3=7ffd5fbbbf2c items=0 ppid=1348 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 17 00:32:56.186000 audit[1418]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.186000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc03d33c80 a2=0 a3=7ffc03d33c6c items=0 ppid=1348 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.186000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 17 00:32:56.189000 audit[1421]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.189000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeba5ac200 a2=0 a3=7ffeba5ac1ec items=0 ppid=1348 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 17 00:32:56.191000 audit[1423]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.191000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc50855980 a2=0 a3=7ffc5085596c items=0 ppid=1348 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.191000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 17 00:32:56.193000 audit[1425]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.193000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd4a9e8cb0 a2=0 a3=7ffd4a9e8c9c items=0 ppid=1348 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.193000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 17 00:32:56.194000 audit[1427]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.194000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff1599df80 a2=0 a3=7fff1599df6c items=0 ppid=1348 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.194000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 17 00:32:56.196000 audit[1429]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.196000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe635a7520 a2=0 a3=7ffe635a750c items=0 ppid=1348 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 17 00:32:56.202000 audit[1432]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.202000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe7ae47df0 a2=0 a3=7ffe7ae47ddc items=0 ppid=1348 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 17 00:32:56.204000 audit[1434]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.204000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff7bc7d770 a2=0 a3=7fff7bc7d75c items=0 ppid=1348 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 17 00:32:56.206000 audit[1436]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.206000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcc4543fb0 a2=0 a3=7ffcc4543f9c items=0 ppid=1348 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 17 00:32:56.208000 audit[1438]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.208000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcc62c7830 a2=0 a3=7ffcc62c781c items=0 ppid=1348 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.208000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 17 00:32:56.209741 systemd-networkd[1022]: docker0: Link UP May 17 00:32:56.218000 audit[1442]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.218000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe96a9a670 a2=0 a3=7ffe96a9a65c items=0 ppid=1348 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.218000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:56.224000 audit[1443]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:32:56.224000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff7c484c60 a2=0 a3=7fff7c484c4c items=0 ppid=1348 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:32:56.224000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 17 00:32:56.226196 env[1348]: time="2025-05-17T00:32:56.226153336Z" level=info msg="Loading containers: done." May 17 00:32:56.244985 env[1348]: time="2025-05-17T00:32:56.244921823Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 17 00:32:56.245214 env[1348]: time="2025-05-17T00:32:56.245151063Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 17 00:32:56.245264 env[1348]: time="2025-05-17T00:32:56.245239950Z" level=info msg="Daemon has completed initialization" May 17 00:32:56.261567 systemd[1]: Started docker.service. May 17 00:32:56.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:32:56.268357 env[1348]: time="2025-05-17T00:32:56.268307946Z" level=info msg="API listen on /run/docker.sock" May 17 00:32:57.077210 env[1200]: time="2025-05-17T00:32:57.077151122Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\"" May 17 00:32:57.939441 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1121126935.mount: Deactivated successfully. May 17 00:32:59.375604 env[1200]: time="2025-05-17T00:32:59.375529404Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:59.377773 env[1200]: time="2025-05-17T00:32:59.377727909Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:59.379638 env[1200]: time="2025-05-17T00:32:59.379614599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:59.381425 env[1200]: time="2025-05-17T00:32:59.381362129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:5b68f0df22013422dc8fb9ddfcff513eb6fc92f9dbf8aae41555c895efef5a20,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:32:59.382104 env[1200]: time="2025-05-17T00:32:59.382068975Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.9\" returns image reference \"sha256:0c19e0eafbdfffa1317cf99a16478265a4cd746ef677de27b0be6a8b515f36b1\"" May 17 00:32:59.382835 env[1200]: time="2025-05-17T00:32:59.382785239Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\"" May 17 00:33:01.251222 env[1200]: time="2025-05-17T00:33:01.251157145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:01.253180 env[1200]: time="2025-05-17T00:33:01.253148992Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:01.254863 env[1200]: time="2025-05-17T00:33:01.254801503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:01.256461 env[1200]: time="2025-05-17T00:33:01.256431081Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:be9e7987d323b38a12e28436cff6d6ec6fc31ffdd3ea11eaa9d74852e9d31248,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:01.257435 env[1200]: time="2025-05-17T00:33:01.257395290Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.9\" returns image reference \"sha256:6aa3d581404ae6ae5dc355cb750aaedec843d2c99263d28fce50277e8e2a6ec2\"" May 17 00:33:01.258034 env[1200]: time="2025-05-17T00:33:01.257983925Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\"" May 17 00:33:03.182728 env[1200]: time="2025-05-17T00:33:03.182678115Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:03.185147 env[1200]: time="2025-05-17T00:33:03.184807792Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:03.186674 env[1200]: time="2025-05-17T00:33:03.186649377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:03.189100 env[1200]: time="2025-05-17T00:33:03.189067645Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:eb358c7346bb17ab2c639c3ff8ab76a147dec7ae609f5c0c2800233e42253ed1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:03.189888 env[1200]: time="2025-05-17T00:33:03.189854381Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.9\" returns image reference \"sha256:737ed3eafaf27a28ea9e13b736011bfed5bd349785ac6bc220b34eaf4adc51e3\"" May 17 00:33:03.190374 env[1200]: time="2025-05-17T00:33:03.190343439Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\"" May 17 00:33:03.331104 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 17 00:33:03.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:03.331280 systemd[1]: Stopped kubelet.service. May 17 00:33:03.331332 systemd[1]: kubelet.service: Consumed 1.380s CPU time. May 17 00:33:03.332138 kernel: kauditd_printk_skb: 84 callbacks suppressed May 17 00:33:03.332178 kernel: audit: type=1130 audit(1747441983.330:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:03.332536 systemd[1]: Starting kubelet.service... May 17 00:33:03.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:03.338447 kernel: audit: type=1131 audit(1747441983.330:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:03.438201 systemd[1]: Started kubelet.service. May 17 00:33:03.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:03.443043 kernel: audit: type=1130 audit(1747441983.437:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:03.939525 kubelet[1486]: E0517 00:33:03.939470 1486 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:33:03.942924 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:33:03.943054 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:33:03.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:33:03.947059 kernel: audit: type=1131 audit(1747441983.942:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:33:05.380502 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3179113982.mount: Deactivated successfully. May 17 00:33:06.597190 env[1200]: time="2025-05-17T00:33:06.597134368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.612640 env[1200]: time="2025-05-17T00:33:06.612574530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.621460 env[1200]: time="2025-05-17T00:33:06.621385523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.657093 env[1200]: time="2025-05-17T00:33:06.657057259Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fdf026cf2434537e499e9c739d189ca8fc57101d929ac5ccd8e24f979a9738c1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:06.657580 env[1200]: time="2025-05-17T00:33:06.657550194Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.9\" returns image reference \"sha256:11a47a71ed3ecf643e15a11990daed3b656279449ba9344db0b54652c4723578\"" May 17 00:33:06.658533 env[1200]: time="2025-05-17T00:33:06.658509854Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\"" May 17 00:33:07.444454 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount421134619.mount: Deactivated successfully. May 17 00:33:08.525272 env[1200]: time="2025-05-17T00:33:08.525080130Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:08.528341 env[1200]: time="2025-05-17T00:33:08.528272921Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:08.530734 env[1200]: time="2025-05-17T00:33:08.530697420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:08.533871 env[1200]: time="2025-05-17T00:33:08.533837111Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:9caabbf6238b189a65d0d6e6ac138de60d6a1c419e5a341fbbb7c78382559c6e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:08.534832 env[1200]: time="2025-05-17T00:33:08.534792905Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.3\" returns image reference \"sha256:c69fa2e9cbf5f42dc48af631e956d3f95724c13f91596bc567591790e5e36db6\"" May 17 00:33:08.535332 env[1200]: time="2025-05-17T00:33:08.535294336Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 17 00:33:09.152586 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3910421092.mount: Deactivated successfully. May 17 00:33:09.157597 env[1200]: time="2025-05-17T00:33:09.157559912Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:09.159453 env[1200]: time="2025-05-17T00:33:09.159412649Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:09.161036 env[1200]: time="2025-05-17T00:33:09.160984128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:09.162385 env[1200]: time="2025-05-17T00:33:09.162331746Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:09.162767 env[1200]: time="2025-05-17T00:33:09.162737989Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 17 00:33:09.163314 env[1200]: time="2025-05-17T00:33:09.163292329Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 17 00:33:09.912213 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3548253675.mount: Deactivated successfully. May 17 00:33:12.816878 env[1200]: time="2025-05-17T00:33:12.816801286Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:12.818907 env[1200]: time="2025-05-17T00:33:12.818873645Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:12.821220 env[1200]: time="2025-05-17T00:33:12.821178109Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:12.823263 env[1200]: time="2025-05-17T00:33:12.823222415Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:12.824109 env[1200]: time="2025-05-17T00:33:12.824066158Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 17 00:33:14.081124 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 17 00:33:14.081322 systemd[1]: Stopped kubelet.service. May 17 00:33:14.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:14.082579 systemd[1]: Starting kubelet.service... May 17 00:33:14.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:14.091605 kernel: audit: type=1130 audit(1747441994.080:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:14.091674 kernel: audit: type=1131 audit(1747441994.080:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:14.167924 systemd[1]: Started kubelet.service. May 17 00:33:14.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:14.173118 kernel: audit: type=1130 audit(1747441994.167:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:14.203077 kubelet[1519]: E0517 00:33:14.203019 1519 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 17 00:33:14.204611 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 17 00:33:14.204724 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 17 00:33:14.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:33:14.209065 kernel: audit: type=1131 audit(1747441994.203:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 17 00:33:15.453748 systemd[1]: Stopped kubelet.service. May 17 00:33:15.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:15.455626 systemd[1]: Starting kubelet.service... May 17 00:33:15.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:15.460805 kernel: audit: type=1130 audit(1747441995.452:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:15.460857 kernel: audit: type=1131 audit(1747441995.452:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:15.476683 systemd[1]: Reloading. May 17 00:33:15.544303 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2025-05-17T00:33:15Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:33:15.544337 /usr/lib/systemd/system-generators/torcx-generator[1552]: time="2025-05-17T00:33:15Z" level=info msg="torcx already run" May 17 00:33:15.852792 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:33:15.852807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:33:15.869295 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:33:15.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933795 kernel: audit: type=1400 audit(1747441995.925:253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933844 kernel: audit: type=1400 audit(1747441995.925:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933862 kernel: audit: type=1400 audit(1747441995.925:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.940852 kernel: audit: type=1400 audit(1747441995.925:256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.932000 audit: BPF prog-id=46 op=LOAD May 17 00:33:15.932000 audit: BPF prog-id=30 op=UNLOAD May 17 00:33:15.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit: BPF prog-id=47 op=LOAD May 17 00:33:15.936000 audit: BPF prog-id=40 op=UNLOAD May 17 00:33:15.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit: BPF prog-id=48 op=LOAD May 17 00:33:15.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.939000 audit: BPF prog-id=49 op=LOAD May 17 00:33:15.939000 audit: BPF prog-id=31 op=UNLOAD May 17 00:33:15.939000 audit: BPF prog-id=32 op=UNLOAD May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit: BPF prog-id=50 op=LOAD May 17 00:33:15.942000 audit: BPF prog-id=41 op=UNLOAD May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit: BPF prog-id=51 op=LOAD May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit: BPF prog-id=52 op=LOAD May 17 00:33:15.942000 audit: BPF prog-id=42 op=UNLOAD May 17 00:33:15.942000 audit: BPF prog-id=43 op=UNLOAD May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit: BPF prog-id=53 op=LOAD May 17 00:33:15.943000 audit: BPF prog-id=33 op=UNLOAD May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit: BPF prog-id=54 op=LOAD May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit: BPF prog-id=55 op=LOAD May 17 00:33:15.943000 audit: BPF prog-id=34 op=UNLOAD May 17 00:33:15.943000 audit: BPF prog-id=35 op=UNLOAD May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.943000 audit: BPF prog-id=56 op=LOAD May 17 00:33:15.943000 audit: BPF prog-id=44 op=UNLOAD May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit: BPF prog-id=57 op=LOAD May 17 00:33:15.944000 audit: BPF prog-id=36 op=UNLOAD May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.944000 audit: BPF prog-id=58 op=LOAD May 17 00:33:15.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit: BPF prog-id=59 op=LOAD May 17 00:33:15.945000 audit: BPF prog-id=37 op=UNLOAD May 17 00:33:15.945000 audit: BPF prog-id=38 op=UNLOAD May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:15.945000 audit: BPF prog-id=60 op=LOAD May 17 00:33:15.945000 audit: BPF prog-id=39 op=UNLOAD May 17 00:33:15.956702 systemd[1]: Started kubelet.service. May 17 00:33:15.958581 systemd[1]: Stopping kubelet.service... May 17 00:33:15.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:15.958889 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:33:15.959051 systemd[1]: Stopped kubelet.service. May 17 00:33:15.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:15.960278 systemd[1]: Starting kubelet.service... May 17 00:33:16.046506 systemd[1]: Started kubelet.service. May 17 00:33:16.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:16.086257 kubelet[1601]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:16.086257 kubelet[1601]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:33:16.086257 kubelet[1601]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:16.086570 kubelet[1601]: I0517 00:33:16.086336 1601 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:33:16.332157 kubelet[1601]: I0517 00:33:16.329796 1601 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:33:16.332157 kubelet[1601]: I0517 00:33:16.329833 1601 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:33:16.332157 kubelet[1601]: I0517 00:33:16.330245 1601 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:33:16.346675 kubelet[1601]: E0517 00:33:16.346636 1601 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.99:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:16.347433 kubelet[1601]: I0517 00:33:16.347411 1601 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:33:16.353604 kubelet[1601]: E0517 00:33:16.353568 1601 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:33:16.353604 kubelet[1601]: I0517 00:33:16.353604 1601 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:33:16.358983 kubelet[1601]: I0517 00:33:16.358957 1601 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:33:16.359628 kubelet[1601]: I0517 00:33:16.359602 1601 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:33:16.359772 kubelet[1601]: I0517 00:33:16.359737 1601 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:33:16.359965 kubelet[1601]: I0517 00:33:16.359767 1601 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:33:16.360065 kubelet[1601]: I0517 00:33:16.359981 1601 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:33:16.360065 kubelet[1601]: I0517 00:33:16.359992 1601 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:33:16.360140 kubelet[1601]: I0517 00:33:16.360126 1601 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:16.365279 kubelet[1601]: I0517 00:33:16.365256 1601 kubelet.go:408] "Attempting to sync node with API server" May 17 00:33:16.365279 kubelet[1601]: I0517 00:33:16.365278 1601 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:33:16.365339 kubelet[1601]: I0517 00:33:16.365315 1601 kubelet.go:314] "Adding apiserver pod source" May 17 00:33:16.365339 kubelet[1601]: I0517 00:33:16.365337 1601 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:33:16.376922 kubelet[1601]: I0517 00:33:16.376891 1601 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:33:16.377411 kubelet[1601]: I0517 00:33:16.377399 1601 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:33:16.379592 kubelet[1601]: W0517 00:33:16.379538 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.99:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:16.379651 kubelet[1601]: E0517 00:33:16.379605 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.99:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:16.379651 kubelet[1601]: W0517 00:33:16.379645 1601 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 17 00:33:16.380448 kubelet[1601]: W0517 00:33:16.380415 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.99:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:16.380547 kubelet[1601]: E0517 00:33:16.380526 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.99:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:16.382784 kubelet[1601]: I0517 00:33:16.382539 1601 server.go:1274] "Started kubelet" May 17 00:33:16.383271 kubelet[1601]: I0517 00:33:16.383233 1601 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:33:16.383555 kubelet[1601]: I0517 00:33:16.383530 1601 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:33:16.383642 kubelet[1601]: I0517 00:33:16.383609 1601 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:33:16.383000 audit[1601]: AVC avc: denied { mac_admin } for pid=1601 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:16.383000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:16.383000 audit[1601]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000046390 a1=c0009045e8 a2=c000046090 a3=25 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:16.383000 audit[1601]: AVC avc: denied { mac_admin } for pid=1601 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:16.383000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:16.383000 audit[1601]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000412a40 a1=c000904600 a2=c000046420 a3=25 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.383000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:16.385243 kubelet[1601]: I0517 00:33:16.384898 1601 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:33:16.385243 kubelet[1601]: I0517 00:33:16.384951 1601 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:33:16.385243 kubelet[1601]: I0517 00:33:16.385045 1601 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:33:16.385931 kubelet[1601]: I0517 00:33:16.385414 1601 server.go:449] "Adding debug handlers to kubelet server" May 17 00:33:16.386017 kubelet[1601]: E0517 00:33:16.385997 1601 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:33:16.386229 kubelet[1601]: I0517 00:33:16.386193 1601 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:33:16.386000 audit[1615]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.386000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffff24d830 a2=0 a3=7fffff24d81c items=0 ppid=1601 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.386000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:33:16.387969 kubelet[1601]: E0517 00:33:16.387305 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:16.387969 kubelet[1601]: I0517 00:33:16.387347 1601 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:33:16.387969 kubelet[1601]: I0517 00:33:16.387538 1601 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:33:16.387969 kubelet[1601]: I0517 00:33:16.387601 1601 reconciler.go:26] "Reconciler: start to sync state" May 17 00:33:16.387969 kubelet[1601]: W0517 00:33:16.387838 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.99:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:16.387969 kubelet[1601]: E0517 00:33:16.387872 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.99:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:16.388152 kubelet[1601]: I0517 00:33:16.388131 1601 factory.go:221] Registration of the systemd container factory successfully May 17 00:33:16.388223 kubelet[1601]: I0517 00:33:16.388197 1601 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:33:16.388411 kubelet[1601]: E0517 00:33:16.388358 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.99:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.99:6443: connect: connection refused" interval="200ms" May 17 00:33:16.389137 kubelet[1601]: I0517 00:33:16.389107 1601 factory.go:221] Registration of the containerd container factory successfully May 17 00:33:16.388000 audit[1616]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.388000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc31e4aa30 a2=0 a3=7ffc31e4aa1c items=0 ppid=1601 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.388000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:33:16.390000 audit[1618]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.390000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2606eda0 a2=0 a3=7ffd2606ed8c items=0 ppid=1601 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.390000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:16.391913 kubelet[1601]: E0517 00:33:16.390953 1601 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.99:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.99:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1840293cc3fab08f default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-17 00:33:16.382515343 +0000 UTC m=+0.331934252,LastTimestamp:2025-05-17 00:33:16.382515343 +0000 UTC m=+0.331934252,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 17 00:33:16.392000 audit[1620]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1620 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.392000 audit[1620]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc6b609d80 a2=0 a3=7ffc6b609d6c items=0 ppid=1601 pid=1620 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.392000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:16.397000 audit[1625]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.397000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcc24faa50 a2=0 a3=7ffcc24faa3c items=0 ppid=1601 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.398598 kubelet[1601]: I0517 00:33:16.398552 1601 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:33:16.398598 kubelet[1601]: I0517 00:33:16.398561 1601 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:33:16.398598 kubelet[1601]: I0517 00:33:16.398573 1601 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:16.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 17 00:33:16.398851 kubelet[1601]: I0517 00:33:16.398823 1601 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:33:16.398000 audit[1626]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1626 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:16.398000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd2a6b6080 a2=0 a3=7ffd2a6b606c items=0 ppid=1601 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.398000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 17 00:33:16.399770 kubelet[1601]: I0517 00:33:16.399749 1601 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:33:16.399800 kubelet[1601]: I0517 00:33:16.399785 1601 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:33:16.399823 kubelet[1601]: I0517 00:33:16.399815 1601 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:33:16.399881 kubelet[1601]: E0517 00:33:16.399852 1601 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:33:16.399000 audit[1628]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.399000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc3b22e4e0 a2=0 a3=7ffc3b22e4cc items=0 ppid=1601 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:33:16.400000 audit[1629]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.400000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3eb9c540 a2=0 a3=7ffe3eb9c52c items=0 ppid=1601 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.400000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:33:16.401000 audit[1630]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1630 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:16.401000 audit[1630]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc4fd0630 a2=0 a3=7ffdc4fd061c items=0 ppid=1601 pid=1630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:33:16.401000 audit[1631]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:16.401000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd28b28610 a2=0 a3=7ffd28b285fc items=0 ppid=1601 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.401000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 17 00:33:16.402000 audit[1632]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1632 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:16.402000 audit[1632]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffc484b020 a2=0 a3=7fffc484b00c items=0 ppid=1601 pid=1632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 17 00:33:16.403000 audit[1633]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:16.403000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcf3d17730 a2=0 a3=7ffcf3d1771c items=0 ppid=1601 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.403000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 17 00:33:16.488109 kubelet[1601]: E0517 00:33:16.488068 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:16.500327 kubelet[1601]: E0517 00:33:16.500287 1601 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:33:16.589275 kubelet[1601]: E0517 00:33:16.589185 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:16.589553 kubelet[1601]: E0517 00:33:16.589513 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.99:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.99:6443: connect: connection refused" interval="400ms" May 17 00:33:16.689739 kubelet[1601]: E0517 00:33:16.689693 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:16.700915 kubelet[1601]: E0517 00:33:16.700871 1601 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 17 00:33:16.790322 kubelet[1601]: E0517 00:33:16.790280 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:16.821124 kubelet[1601]: I0517 00:33:16.821090 1601 policy_none.go:49] "None policy: Start" May 17 00:33:16.821306 kubelet[1601]: W0517 00:33:16.821224 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.99:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:16.821306 kubelet[1601]: E0517 00:33:16.821292 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.99:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:16.821856 kubelet[1601]: I0517 00:33:16.821839 1601 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:33:16.821903 kubelet[1601]: I0517 00:33:16.821872 1601 state_mem.go:35] "Initializing new in-memory state store" May 17 00:33:16.840333 systemd[1]: Created slice kubepods.slice. May 17 00:33:16.843671 systemd[1]: Created slice kubepods-besteffort.slice. May 17 00:33:16.849654 systemd[1]: Created slice kubepods-burstable.slice. May 17 00:33:16.850543 kubelet[1601]: I0517 00:33:16.850510 1601 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:33:16.850543 kubelet[1601]: I0517 00:33:16.850567 1601 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:33:16.849000 audit[1601]: AVC avc: denied { mac_admin } for pid=1601 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:16.849000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:16.849000 audit[1601]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f19290 a1=c000f24588 a2=c000f19260 a3=25 items=0 ppid=1 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:16.849000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:16.850782 kubelet[1601]: I0517 00:33:16.850653 1601 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:33:16.850782 kubelet[1601]: I0517 00:33:16.850666 1601 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:33:16.851350 kubelet[1601]: I0517 00:33:16.850907 1601 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:33:16.851725 kubelet[1601]: E0517 00:33:16.851699 1601 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 17 00:33:16.951765 kubelet[1601]: I0517 00:33:16.951711 1601 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:33:16.952150 kubelet[1601]: E0517 00:33:16.952126 1601 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.99:6443/api/v1/nodes\": dial tcp 10.0.0.99:6443: connect: connection refused" node="localhost" May 17 00:33:16.990927 kubelet[1601]: E0517 00:33:16.990859 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.99:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.99:6443: connect: connection refused" interval="800ms" May 17 00:33:17.108931 systemd[1]: Created slice kubepods-burstable-podea5884ad3481d5218ff4c8f11f2934d5.slice. May 17 00:33:17.116319 systemd[1]: Created slice kubepods-burstable-pod6a2b87c704086155ad6c0d41fa7f200d.slice. May 17 00:33:17.119105 systemd[1]: Created slice kubepods-burstable-poda3416600bab1918b24583836301c9096.slice. May 17 00:33:17.153465 kubelet[1601]: I0517 00:33:17.153428 1601 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:33:17.153813 kubelet[1601]: E0517 00:33:17.153788 1601 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.99:6443/api/v1/nodes\": dial tcp 10.0.0.99:6443: connect: connection refused" node="localhost" May 17 00:33:17.192125 kubelet[1601]: I0517 00:33:17.192083 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6a2b87c704086155ad6c0d41fa7f200d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"6a2b87c704086155ad6c0d41fa7f200d\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:17.192125 kubelet[1601]: I0517 00:33:17.192119 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.192244 kubelet[1601]: I0517 00:33:17.192142 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.192244 kubelet[1601]: I0517 00:33:17.192171 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.192244 kubelet[1601]: I0517 00:33:17.192192 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6a2b87c704086155ad6c0d41fa7f200d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a2b87c704086155ad6c0d41fa7f200d\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:17.192244 kubelet[1601]: I0517 00:33:17.192212 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6a2b87c704086155ad6c0d41fa7f200d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a2b87c704086155ad6c0d41fa7f200d\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:17.192244 kubelet[1601]: I0517 00:33:17.192230 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.192367 kubelet[1601]: I0517 00:33:17.192260 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:17.192367 kubelet[1601]: I0517 00:33:17.192309 1601 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ea5884ad3481d5218ff4c8f11f2934d5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"ea5884ad3481d5218ff4c8f11f2934d5\") " pod="kube-system/kube-scheduler-localhost" May 17 00:33:17.416967 kubelet[1601]: E0517 00:33:17.416289 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:17.418137 env[1200]: time="2025-05-17T00:33:17.418090536Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:ea5884ad3481d5218ff4c8f11f2934d5,Namespace:kube-system,Attempt:0,}" May 17 00:33:17.418718 kubelet[1601]: E0517 00:33:17.418682 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:17.419135 env[1200]: time="2025-05-17T00:33:17.419084591Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:6a2b87c704086155ad6c0d41fa7f200d,Namespace:kube-system,Attempt:0,}" May 17 00:33:17.420754 kubelet[1601]: E0517 00:33:17.420708 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:17.421336 env[1200]: time="2025-05-17T00:33:17.421289739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:a3416600bab1918b24583836301c9096,Namespace:kube-system,Attempt:0,}" May 17 00:33:17.542221 kubelet[1601]: W0517 00:33:17.542130 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.99:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:17.542221 kubelet[1601]: E0517 00:33:17.542214 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.99:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:17.555373 kubelet[1601]: I0517 00:33:17.555353 1601 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:33:17.555540 kubelet[1601]: E0517 00:33:17.555516 1601 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.99:6443/api/v1/nodes\": dial tcp 10.0.0.99:6443: connect: connection refused" node="localhost" May 17 00:33:17.688758 kubelet[1601]: W0517 00:33:17.688605 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.99:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:17.688758 kubelet[1601]: E0517 00:33:17.688705 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.99:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:17.710783 kubelet[1601]: W0517 00:33:17.710713 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.99:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:17.710891 kubelet[1601]: E0517 00:33:17.710788 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.99:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:17.791804 kubelet[1601]: E0517 00:33:17.791735 1601 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.99:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.99:6443: connect: connection refused" interval="1.6s" May 17 00:33:17.965485 kubelet[1601]: W0517 00:33:17.965368 1601 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.99:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.99:6443: connect: connection refused May 17 00:33:17.965485 kubelet[1601]: E0517 00:33:17.965449 1601 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.99:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.99:6443: connect: connection refused" logger="UnhandledError" May 17 00:33:18.083783 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2877770136.mount: Deactivated successfully. May 17 00:33:18.089518 env[1200]: time="2025-05-17T00:33:18.089482655Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.093118 env[1200]: time="2025-05-17T00:33:18.093073523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.094076 env[1200]: time="2025-05-17T00:33:18.094051478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.098512 env[1200]: time="2025-05-17T00:33:18.098483424Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.100087 env[1200]: time="2025-05-17T00:33:18.100063279Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.101486 env[1200]: time="2025-05-17T00:33:18.101442176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.102919 env[1200]: time="2025-05-17T00:33:18.102889562Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.105085 env[1200]: time="2025-05-17T00:33:18.105051990Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.106877 env[1200]: time="2025-05-17T00:33:18.106844653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.107439 env[1200]: time="2025-05-17T00:33:18.107410645Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.108819 env[1200]: time="2025-05-17T00:33:18.108786166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.110243 env[1200]: time="2025-05-17T00:33:18.110212523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:18.125080 env[1200]: time="2025-05-17T00:33:18.125006022Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:18.125080 env[1200]: time="2025-05-17T00:33:18.125062077Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:18.125224 env[1200]: time="2025-05-17T00:33:18.125076103Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:18.125332 env[1200]: time="2025-05-17T00:33:18.125276519Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fd8c2b8d1f1b7320e65ca6222c3a03655864b8c5b59ba23c25b945a752759af6 pid=1643 runtime=io.containerd.runc.v2 May 17 00:33:18.134122 env[1200]: time="2025-05-17T00:33:18.134059240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:18.134268 env[1200]: time="2025-05-17T00:33:18.134140973Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:18.134268 env[1200]: time="2025-05-17T00:33:18.134152975Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:18.134333 env[1200]: time="2025-05-17T00:33:18.134295413Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/18b113fbee02a1565e788c32d967bed8b404c02125b01a92e01130b36daa82f9 pid=1665 runtime=io.containerd.runc.v2 May 17 00:33:18.139103 systemd[1]: Started cri-containerd-fd8c2b8d1f1b7320e65ca6222c3a03655864b8c5b59ba23c25b945a752759af6.scope. May 17 00:33:18.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.149000 audit: BPF prog-id=61 op=LOAD May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664386332623864316631623733323065363563613632323263336130 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664386332623864316631623733323065363563613632323263336130 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit: BPF prog-id=62 op=LOAD May 17 00:33:18.150000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c0003d8000 items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664386332623864316631623733323065363563613632323263336130 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit: BPF prog-id=63 op=LOAD May 17 00:33:18.150000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0003d8048 items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664386332623864316631623733323065363563613632323263336130 May 17 00:33:18.150000 audit: BPF prog-id=63 op=UNLOAD May 17 00:33:18.150000 audit: BPF prog-id=62 op=UNLOAD May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { perfmon } for pid=1653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit[1653]: AVC avc: denied { bpf } for pid=1653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.150000 audit: BPF prog-id=64 op=LOAD May 17 00:33:18.150000 audit[1653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003d8458 items=0 ppid=1643 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664386332623864316631623733323065363563613632323263336130 May 17 00:33:18.161998 systemd[1]: Started cri-containerd-18b113fbee02a1565e788c32d967bed8b404c02125b01a92e01130b36daa82f9.scope. May 17 00:33:18.168546 env[1200]: time="2025-05-17T00:33:18.168476501Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:18.168546 env[1200]: time="2025-05-17T00:33:18.168517137Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:18.168546 env[1200]: time="2025-05-17T00:33:18.168528970Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:18.168768 env[1200]: time="2025-05-17T00:33:18.168676116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d625ab59c5245a80a8641a0e712d5ce92b2fb3f42a06239db760bb4f3cf63c10 pid=1698 runtime=io.containerd.runc.v2 May 17 00:33:18.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.173000 audit: BPF prog-id=65 op=LOAD May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=1665 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623131336662656530326131353635653738386333326439363762 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002176b0 a2=3c a3=c items=0 ppid=1665 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623131336662656530326131353635653738386333326439363762 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit: BPF prog-id=66 op=LOAD May 17 00:33:18.174000 audit[1679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002179d8 a2=78 a3=c0003e8900 items=0 ppid=1665 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623131336662656530326131353635653738386333326439363762 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit: BPF prog-id=67 op=LOAD May 17 00:33:18.174000 audit[1679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000217770 a2=78 a3=c0003e8948 items=0 ppid=1665 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623131336662656530326131353635653738386333326439363762 May 17 00:33:18.174000 audit: BPF prog-id=67 op=UNLOAD May 17 00:33:18.174000 audit: BPF prog-id=66 op=UNLOAD May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { perfmon } for pid=1679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit[1679]: AVC avc: denied { bpf } for pid=1679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.174000 audit: BPF prog-id=68 op=LOAD May 17 00:33:18.174000 audit[1679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000217c30 a2=78 a3=c0003e8d58 items=0 ppid=1665 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138623131336662656530326131353635653738386333326439363762 May 17 00:33:18.178824 env[1200]: time="2025-05-17T00:33:18.178786557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:a3416600bab1918b24583836301c9096,Namespace:kube-system,Attempt:0,} returns sandbox id \"fd8c2b8d1f1b7320e65ca6222c3a03655864b8c5b59ba23c25b945a752759af6\"" May 17 00:33:18.179799 kubelet[1601]: E0517 00:33:18.179766 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.182281 env[1200]: time="2025-05-17T00:33:18.181523874Z" level=info msg="CreateContainer within sandbox \"fd8c2b8d1f1b7320e65ca6222c3a03655864b8c5b59ba23c25b945a752759af6\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 17 00:33:18.182113 systemd[1]: Started cri-containerd-d625ab59c5245a80a8641a0e712d5ce92b2fb3f42a06239db760bb4f3cf63c10.scope. May 17 00:33:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.191000 audit: BPF prog-id=69 op=LOAD May 17 00:33:18.192000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1698 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323561623539633532343561383061383634316130653731326435 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1698 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323561623539633532343561383061383634316130653731326435 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.192000 audit: BPF prog-id=70 op=LOAD May 17 00:33:18.192000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a5a50 items=0 ppid=1698 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323561623539633532343561383061383634316130653731326435 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit: BPF prog-id=71 op=LOAD May 17 00:33:18.193000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a5a98 items=0 ppid=1698 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323561623539633532343561383061383634316130653731326435 May 17 00:33:18.193000 audit: BPF prog-id=71 op=UNLOAD May 17 00:33:18.193000 audit: BPF prog-id=70 op=UNLOAD May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { perfmon } for pid=1727 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit[1727]: AVC avc: denied { bpf } for pid=1727 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.193000 audit: BPF prog-id=72 op=LOAD May 17 00:33:18.193000 audit[1727]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a5ea8 items=0 ppid=1698 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323561623539633532343561383061383634316130653731326435 May 17 00:33:18.197541 env[1200]: time="2025-05-17T00:33:18.197464916Z" level=info msg="CreateContainer within sandbox \"fd8c2b8d1f1b7320e65ca6222c3a03655864b8c5b59ba23c25b945a752759af6\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"61686860b9c3c7382ce25fa619a9ff66233d1104f844847849b5a288f5b19dad\"" May 17 00:33:18.197961 env[1200]: time="2025-05-17T00:33:18.197934387Z" level=info msg="StartContainer for \"61686860b9c3c7382ce25fa619a9ff66233d1104f844847849b5a288f5b19dad\"" May 17 00:33:18.201863 env[1200]: time="2025-05-17T00:33:18.201824286Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:6a2b87c704086155ad6c0d41fa7f200d,Namespace:kube-system,Attempt:0,} returns sandbox id \"18b113fbee02a1565e788c32d967bed8b404c02125b01a92e01130b36daa82f9\"" May 17 00:33:18.203619 kubelet[1601]: E0517 00:33:18.202932 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.204385 env[1200]: time="2025-05-17T00:33:18.204358802Z" level=info msg="CreateContainer within sandbox \"18b113fbee02a1565e788c32d967bed8b404c02125b01a92e01130b36daa82f9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 17 00:33:18.213392 systemd[1]: Started cri-containerd-61686860b9c3c7382ce25fa619a9ff66233d1104f844847849b5a288f5b19dad.scope. May 17 00:33:18.220108 env[1200]: time="2025-05-17T00:33:18.216979423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:ea5884ad3481d5218ff4c8f11f2934d5,Namespace:kube-system,Attempt:0,} returns sandbox id \"d625ab59c5245a80a8641a0e712d5ce92b2fb3f42a06239db760bb4f3cf63c10\"" May 17 00:33:18.220108 env[1200]: time="2025-05-17T00:33:18.218953798Z" level=info msg="CreateContainer within sandbox \"d625ab59c5245a80a8641a0e712d5ce92b2fb3f42a06239db760bb4f3cf63c10\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 17 00:33:18.220240 kubelet[1601]: E0517 00:33:18.217661 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.223121 env[1200]: time="2025-05-17T00:33:18.223075813Z" level=info msg="CreateContainer within sandbox \"18b113fbee02a1565e788c32d967bed8b404c02125b01a92e01130b36daa82f9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"858ebea5a299e3cf6269e87ce4c22897f45c343f4d2236fc2bb26b2beb8ccb1d\"" May 17 00:33:18.224441 env[1200]: time="2025-05-17T00:33:18.224410978Z" level=info msg="StartContainer for \"858ebea5a299e3cf6269e87ce4c22897f45c343f4d2236fc2bb26b2beb8ccb1d\"" May 17 00:33:18.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit: BPF prog-id=73 op=LOAD May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1643 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363836383630623963336337333832636532356661363139613966 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1643 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363836383630623963336337333832636532356661363139613966 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit: BPF prog-id=74 op=LOAD May 17 00:33:18.226000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002f7000 items=0 ppid=1643 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363836383630623963336337333832636532356661363139613966 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.226000 audit: BPF prog-id=75 op=LOAD May 17 00:33:18.226000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002f7048 items=0 ppid=1643 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363836383630623963336337333832636532356661363139613966 May 17 00:33:18.227000 audit: BPF prog-id=75 op=UNLOAD May 17 00:33:18.227000 audit: BPF prog-id=74 op=UNLOAD May 17 00:33:18.227000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { perfmon } for pid=1758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit[1758]: AVC avc: denied { bpf } for pid=1758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.227000 audit: BPF prog-id=76 op=LOAD May 17 00:33:18.227000 audit[1758]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002f7458 items=0 ppid=1643 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631363836383630623963336337333832636532356661363139613966 May 17 00:33:18.238889 env[1200]: time="2025-05-17T00:33:18.238851855Z" level=info msg="CreateContainer within sandbox \"d625ab59c5245a80a8641a0e712d5ce92b2fb3f42a06239db760bb4f3cf63c10\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"32f04e85a78d559ad649453fb528795e66855a26e6c158bc2b2dbbba27bca437\"" May 17 00:33:18.239642 env[1200]: time="2025-05-17T00:33:18.239623964Z" level=info msg="StartContainer for \"32f04e85a78d559ad649453fb528795e66855a26e6c158bc2b2dbbba27bca437\"" May 17 00:33:18.240816 systemd[1]: Started cri-containerd-858ebea5a299e3cf6269e87ce4c22897f45c343f4d2236fc2bb26b2beb8ccb1d.scope. May 17 00:33:18.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.252000 audit: BPF prog-id=77 op=LOAD May 17 00:33:18.253658 env[1200]: time="2025-05-17T00:33:18.253621680Z" level=info msg="StartContainer for \"61686860b9c3c7382ce25fa619a9ff66233d1104f844847849b5a288f5b19dad\" returns successfully" May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1665 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835386562656135613239396533636636323639653837636534633232 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1665 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835386562656135613239396533636636323639653837636534633232 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit: BPF prog-id=78 op=LOAD May 17 00:33:18.253000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003de810 items=0 ppid=1665 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835386562656135613239396533636636323639653837636534633232 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit: BPF prog-id=79 op=LOAD May 17 00:33:18.253000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003de858 items=0 ppid=1665 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835386562656135613239396533636636323639653837636534633232 May 17 00:33:18.253000 audit: BPF prog-id=79 op=UNLOAD May 17 00:33:18.253000 audit: BPF prog-id=78 op=UNLOAD May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { perfmon } for pid=1795 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit[1795]: AVC avc: denied { bpf } for pid=1795 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.253000 audit: BPF prog-id=80 op=LOAD May 17 00:33:18.253000 audit[1795]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003dec68 items=0 ppid=1665 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835386562656135613239396533636636323639653837636534633232 May 17 00:33:18.257486 systemd[1]: Started cri-containerd-32f04e85a78d559ad649453fb528795e66855a26e6c158bc2b2dbbba27bca437.scope. May 17 00:33:18.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.268000 audit: BPF prog-id=81 op=LOAD May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1698 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332663034653835613738643535396164363439343533666235323837 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1698 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332663034653835613738643535396164363439343533666235323837 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit: BPF prog-id=82 op=LOAD May 17 00:33:18.269000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00030ee60 items=0 ppid=1698 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332663034653835613738643535396164363439343533666235323837 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit: BPF prog-id=83 op=LOAD May 17 00:33:18.269000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00030eea8 items=0 ppid=1698 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332663034653835613738643535396164363439343533666235323837 May 17 00:33:18.269000 audit: BPF prog-id=83 op=UNLOAD May 17 00:33:18.269000 audit: BPF prog-id=82 op=UNLOAD May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:18.269000 audit: BPF prog-id=84 op=LOAD May 17 00:33:18.269000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00030f2b8 items=0 ppid=1698 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:18.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332663034653835613738643535396164363439343533666235323837 May 17 00:33:18.288412 env[1200]: time="2025-05-17T00:33:18.288366586Z" level=info msg="StartContainer for \"858ebea5a299e3cf6269e87ce4c22897f45c343f4d2236fc2bb26b2beb8ccb1d\" returns successfully" May 17 00:33:18.304086 env[1200]: time="2025-05-17T00:33:18.304036009Z" level=info msg="StartContainer for \"32f04e85a78d559ad649453fb528795e66855a26e6c158bc2b2dbbba27bca437\" returns successfully" May 17 00:33:18.356945 kubelet[1601]: I0517 00:33:18.356904 1601 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:33:18.411843 kubelet[1601]: E0517 00:33:18.411810 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.414057 kubelet[1601]: E0517 00:33:18.414039 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.418885 kubelet[1601]: E0517 00:33:18.418869 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:18.902000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:18.902000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00041cb20 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:18.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:18.903000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:18.903000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000a0c000 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:18.903000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:19.244000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.246463 kernel: kauditd_printk_skb: 567 callbacks suppressed May 17 00:33:19.246595 kernel: audit: type=1400 audit(1747441999.244:553): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.255616 kernel: audit: type=1300 audit(1747441999.244:553): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0041a0030 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.244000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0041a0030 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.260059 kernel: audit: type=1400 audit(1747441999.244:554): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.244000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.283647 kernel: audit: type=1327 audit(1747441999.244:553): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.289213 kernel: audit: type=1300 audit(1747441999.244:554): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c009332b40 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.244000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c009332b40 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.293872 kernel: audit: type=1327 audit(1747441999.244:554): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.297665 kernel: audit: type=1400 audit(1747441999.244:555): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.244000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.302546 kernel: audit: type=1300 audit(1747441999.244:555): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006b24120 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.244000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006b24120 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.306811 kernel: audit: type=1327 audit(1747441999.244:555): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.249000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.323588 kernel: audit: type=1400 audit(1747441999.249:556): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.249000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c004278c00 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.249000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.249000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0063d7140 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.249000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:19.249000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0068ad380 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:33:19.249000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:33:19.420471 kubelet[1601]: E0517 00:33:19.420427 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:19.424716 kubelet[1601]: I0517 00:33:19.424683 1601 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 17 00:33:19.424778 kubelet[1601]: E0517 00:33:19.424719 1601 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 17 00:33:19.501460 kubelet[1601]: E0517 00:33:19.501331 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:19.601725 kubelet[1601]: E0517 00:33:19.601688 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:19.702119 kubelet[1601]: E0517 00:33:19.702060 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:19.802760 kubelet[1601]: E0517 00:33:19.802649 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:19.903825 kubelet[1601]: E0517 00:33:19.903778 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.004342 kubelet[1601]: E0517 00:33:20.004293 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.104885 kubelet[1601]: E0517 00:33:20.104843 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.205641 kubelet[1601]: E0517 00:33:20.205599 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.306316 kubelet[1601]: E0517 00:33:20.306268 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.406682 kubelet[1601]: E0517 00:33:20.406560 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.507147 kubelet[1601]: E0517 00:33:20.507099 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.607704 kubelet[1601]: E0517 00:33:20.607657 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.708270 kubelet[1601]: E0517 00:33:20.708157 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:20.808733 kubelet[1601]: E0517 00:33:20.808688 1601 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 17 00:33:21.368517 kubelet[1601]: I0517 00:33:21.368466 1601 apiserver.go:52] "Watching apiserver" May 17 00:33:21.387647 kubelet[1601]: I0517 00:33:21.387617 1601 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:33:22.046977 kubelet[1601]: E0517 00:33:22.046946 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:22.424119 kubelet[1601]: E0517 00:33:22.424086 1601 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:22.482175 systemd[1]: Reloading. May 17 00:33:22.540110 /usr/lib/systemd/system-generators/torcx-generator[1903]: time="2025-05-17T00:33:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 17 00:33:22.540443 /usr/lib/systemd/system-generators/torcx-generator[1903]: time="2025-05-17T00:33:22Z" level=info msg="torcx already run" May 17 00:33:22.602837 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 17 00:33:22.602858 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 17 00:33:22.619485 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 17 00:33:22.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.687000 audit: BPF prog-id=85 op=LOAD May 17 00:33:22.687000 audit: BPF prog-id=46 op=UNLOAD May 17 00:33:22.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.688000 audit: BPF prog-id=86 op=LOAD May 17 00:33:22.688000 audit: BPF prog-id=47 op=UNLOAD May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit: BPF prog-id=87 op=LOAD May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.689000 audit: BPF prog-id=88 op=LOAD May 17 00:33:22.689000 audit: BPF prog-id=48 op=UNLOAD May 17 00:33:22.689000 audit: BPF prog-id=49 op=UNLOAD May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit: BPF prog-id=89 op=LOAD May 17 00:33:22.690000 audit: BPF prog-id=65 op=UNLOAD May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.690000 audit: BPF prog-id=90 op=LOAD May 17 00:33:22.690000 audit: BPF prog-id=73 op=UNLOAD May 17 00:33:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.692000 audit: BPF prog-id=91 op=LOAD May 17 00:33:22.692000 audit: BPF prog-id=81 op=UNLOAD May 17 00:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.693000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit: BPF prog-id=92 op=LOAD May 17 00:33:22.694000 audit: BPF prog-id=50 op=UNLOAD May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit: BPF prog-id=93 op=LOAD May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit: BPF prog-id=94 op=LOAD May 17 00:33:22.694000 audit: BPF prog-id=51 op=UNLOAD May 17 00:33:22.694000 audit: BPF prog-id=52 op=UNLOAD May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.694000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit: BPF prog-id=95 op=LOAD May 17 00:33:22.695000 audit: BPF prog-id=53 op=UNLOAD May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit: BPF prog-id=96 op=LOAD May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit: BPF prog-id=97 op=LOAD May 17 00:33:22.695000 audit: BPF prog-id=54 op=UNLOAD May 17 00:33:22.695000 audit: BPF prog-id=55 op=UNLOAD May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.695000 audit: BPF prog-id=98 op=LOAD May 17 00:33:22.695000 audit: BPF prog-id=56 op=UNLOAD May 17 00:33:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.696000 audit: BPF prog-id=99 op=LOAD May 17 00:33:22.696000 audit: BPF prog-id=77 op=UNLOAD May 17 00:33:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit: BPF prog-id=100 op=LOAD May 17 00:33:22.698000 audit: BPF prog-id=57 op=UNLOAD May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit: BPF prog-id=101 op=LOAD May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit: BPF prog-id=102 op=LOAD May 17 00:33:22.698000 audit: BPF prog-id=58 op=UNLOAD May 17 00:33:22.698000 audit: BPF prog-id=59 op=UNLOAD May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit: BPF prog-id=103 op=LOAD May 17 00:33:22.699000 audit: BPF prog-id=69 op=UNLOAD May 17 00:33:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.699000 audit: BPF prog-id=104 op=LOAD May 17 00:33:22.699000 audit: BPF prog-id=60 op=UNLOAD May 17 00:33:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.700000 audit: BPF prog-id=105 op=LOAD May 17 00:33:22.700000 audit: BPF prog-id=61 op=UNLOAD May 17 00:33:22.710969 systemd[1]: Stopping kubelet.service... May 17 00:33:22.735277 systemd[1]: kubelet.service: Deactivated successfully. May 17 00:33:22.735425 systemd[1]: Stopped kubelet.service. May 17 00:33:22.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:22.736911 systemd[1]: Starting kubelet.service... May 17 00:33:22.821205 systemd[1]: Started kubelet.service. May 17 00:33:22.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:22.853644 kubelet[1947]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:22.853644 kubelet[1947]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 17 00:33:22.853644 kubelet[1947]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 17 00:33:22.853978 kubelet[1947]: I0517 00:33:22.853684 1947 server.go:211] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 17 00:33:22.859399 kubelet[1947]: I0517 00:33:22.859366 1947 server.go:491] "Kubelet version" kubeletVersion="v1.31.8" May 17 00:33:22.859399 kubelet[1947]: I0517 00:33:22.859387 1947 server.go:493] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 17 00:33:22.859595 kubelet[1947]: I0517 00:33:22.859567 1947 server.go:934] "Client rotation is on, will bootstrap in background" May 17 00:33:22.860570 kubelet[1947]: I0517 00:33:22.860551 1947 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 17 00:33:22.862102 kubelet[1947]: I0517 00:33:22.862084 1947 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 17 00:33:22.864269 kubelet[1947]: E0517 00:33:22.864248 1947 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 17 00:33:22.864334 kubelet[1947]: I0517 00:33:22.864278 1947 server.go:1408] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 17 00:33:22.867557 kubelet[1947]: I0517 00:33:22.867522 1947 server.go:749] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 17 00:33:22.867615 kubelet[1947]: I0517 00:33:22.867605 1947 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 17 00:33:22.867711 kubelet[1947]: I0517 00:33:22.867677 1947 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 17 00:33:22.867859 kubelet[1947]: I0517 00:33:22.867699 1947 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 17 00:33:22.867859 kubelet[1947]: I0517 00:33:22.867857 1947 topology_manager.go:138] "Creating topology manager with none policy" May 17 00:33:22.868096 kubelet[1947]: I0517 00:33:22.867865 1947 container_manager_linux.go:300] "Creating device plugin manager" May 17 00:33:22.868096 kubelet[1947]: I0517 00:33:22.867887 1947 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:22.868096 kubelet[1947]: I0517 00:33:22.867964 1947 kubelet.go:408] "Attempting to sync node with API server" May 17 00:33:22.868096 kubelet[1947]: I0517 00:33:22.867975 1947 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 17 00:33:22.868096 kubelet[1947]: I0517 00:33:22.868008 1947 kubelet.go:314] "Adding apiserver pod source" May 17 00:33:22.868096 kubelet[1947]: I0517 00:33:22.868017 1947 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 17 00:33:22.876585 kubelet[1947]: I0517 00:33:22.876558 1947 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 17 00:33:22.877794 kubelet[1947]: I0517 00:33:22.877771 1947 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 17 00:33:22.878583 kubelet[1947]: I0517 00:33:22.878557 1947 server.go:1274] "Started kubelet" May 17 00:33:22.881000 audit[1947]: AVC avc: denied { mac_admin } for pid=1947 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.881000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:22.881000 audit[1947]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a25a10 a1=c000a2eab0 a2=c000a259e0 a3=25 items=0 ppid=1 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:22.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:22.881000 audit[1947]: AVC avc: denied { mac_admin } for pid=1947 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.881000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:22.881000 audit[1947]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c2e6a0 a1=c000a2eac8 a2=c000a25aa0 a3=25 items=0 ppid=1 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:22.881000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:22.882881 kubelet[1947]: I0517 00:33:22.882537 1947 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 17 00:33:22.882881 kubelet[1947]: I0517 00:33:22.882606 1947 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 17 00:33:22.882881 kubelet[1947]: I0517 00:33:22.882658 1947 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 17 00:33:22.882964 kubelet[1947]: I0517 00:33:22.882903 1947 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 17 00:33:22.883627 kubelet[1947]: I0517 00:33:22.883606 1947 server.go:449] "Adding debug handlers to kubelet server" May 17 00:33:22.884813 kubelet[1947]: I0517 00:33:22.884785 1947 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 17 00:33:22.884984 kubelet[1947]: I0517 00:33:22.884964 1947 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 17 00:33:22.885125 kubelet[1947]: I0517 00:33:22.885101 1947 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 17 00:33:22.885528 kubelet[1947]: I0517 00:33:22.885511 1947 volume_manager.go:289] "Starting Kubelet Volume Manager" May 17 00:33:22.885675 kubelet[1947]: I0517 00:33:22.885657 1947 desired_state_of_world_populator.go:147] "Desired state populator starts to run" May 17 00:33:22.885802 kubelet[1947]: I0517 00:33:22.885782 1947 reconciler.go:26] "Reconciler: start to sync state" May 17 00:33:22.885933 kubelet[1947]: E0517 00:33:22.885915 1947 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 17 00:33:22.886841 kubelet[1947]: I0517 00:33:22.886820 1947 factory.go:221] Registration of the systemd container factory successfully May 17 00:33:22.886966 kubelet[1947]: I0517 00:33:22.886943 1947 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 17 00:33:22.891268 kubelet[1947]: I0517 00:33:22.891233 1947 factory.go:221] Registration of the containerd container factory successfully May 17 00:33:22.892955 kubelet[1947]: I0517 00:33:22.892905 1947 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 17 00:33:22.895119 kubelet[1947]: I0517 00:33:22.895096 1947 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 17 00:33:22.895119 kubelet[1947]: I0517 00:33:22.895119 1947 status_manager.go:217] "Starting to sync pod status with apiserver" May 17 00:33:22.895400 kubelet[1947]: I0517 00:33:22.895162 1947 kubelet.go:2321] "Starting kubelet main sync loop" May 17 00:33:22.895400 kubelet[1947]: E0517 00:33:22.895225 1947 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 17 00:33:22.921793 kubelet[1947]: I0517 00:33:22.921765 1947 cpu_manager.go:214] "Starting CPU manager" policy="none" May 17 00:33:22.921793 kubelet[1947]: I0517 00:33:22.921783 1947 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 17 00:33:22.921793 kubelet[1947]: I0517 00:33:22.921799 1947 state_mem.go:36] "Initialized new in-memory state store" May 17 00:33:22.921980 kubelet[1947]: I0517 00:33:22.921922 1947 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 17 00:33:22.921980 kubelet[1947]: I0517 00:33:22.921930 1947 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 17 00:33:22.921980 kubelet[1947]: I0517 00:33:22.921947 1947 policy_none.go:49] "None policy: Start" May 17 00:33:22.922470 kubelet[1947]: I0517 00:33:22.922455 1947 memory_manager.go:170] "Starting memorymanager" policy="None" May 17 00:33:22.922523 kubelet[1947]: I0517 00:33:22.922502 1947 state_mem.go:35] "Initializing new in-memory state store" May 17 00:33:22.922692 kubelet[1947]: I0517 00:33:22.922671 1947 state_mem.go:75] "Updated machine memory state" May 17 00:33:22.925860 kubelet[1947]: I0517 00:33:22.925836 1947 manager.go:513] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 17 00:33:22.924000 audit[1947]: AVC avc: denied { mac_admin } for pid=1947 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:22.924000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 17 00:33:22.924000 audit[1947]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ad29f0 a1=c000f4f710 a2=c000ad29c0 a3=25 items=0 ppid=1 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:22.924000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 17 00:33:22.926145 kubelet[1947]: I0517 00:33:22.925906 1947 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 17 00:33:22.926145 kubelet[1947]: I0517 00:33:22.926069 1947 eviction_manager.go:189] "Eviction manager: starting control loop" May 17 00:33:22.926145 kubelet[1947]: I0517 00:33:22.926083 1947 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 17 00:33:22.926461 kubelet[1947]: I0517 00:33:22.926448 1947 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 17 00:33:23.002155 kubelet[1947]: E0517 00:33:23.001998 1947 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 17 00:33:23.031141 kubelet[1947]: I0517 00:33:23.031114 1947 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 17 00:33:23.037081 kubelet[1947]: I0517 00:33:23.037053 1947 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 17 00:33:23.037266 kubelet[1947]: I0517 00:33:23.037135 1947 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 17 00:33:23.187637 kubelet[1947]: I0517 00:33:23.187573 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:23.187637 kubelet[1947]: I0517 00:33:23.187613 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:23.187637 kubelet[1947]: I0517 00:33:23.187632 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:23.187956 kubelet[1947]: I0517 00:33:23.187681 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:23.187956 kubelet[1947]: I0517 00:33:23.187713 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/a3416600bab1918b24583836301c9096-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"a3416600bab1918b24583836301c9096\") " pod="kube-system/kube-controller-manager-localhost" May 17 00:33:23.187956 kubelet[1947]: I0517 00:33:23.187733 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/6a2b87c704086155ad6c0d41fa7f200d-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a2b87c704086155ad6c0d41fa7f200d\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:23.187956 kubelet[1947]: I0517 00:33:23.187756 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/6a2b87c704086155ad6c0d41fa7f200d-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"6a2b87c704086155ad6c0d41fa7f200d\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:23.187956 kubelet[1947]: I0517 00:33:23.187785 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/6a2b87c704086155ad6c0d41fa7f200d-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"6a2b87c704086155ad6c0d41fa7f200d\") " pod="kube-system/kube-apiserver-localhost" May 17 00:33:23.188176 kubelet[1947]: I0517 00:33:23.187886 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/ea5884ad3481d5218ff4c8f11f2934d5-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"ea5884ad3481d5218ff4c8f11f2934d5\") " pod="kube-system/kube-scheduler-localhost" May 17 00:33:23.301075 kubelet[1947]: E0517 00:33:23.300571 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:23.302665 kubelet[1947]: E0517 00:33:23.302627 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:23.302726 kubelet[1947]: E0517 00:33:23.302630 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:23.868790 kubelet[1947]: I0517 00:33:23.868747 1947 apiserver.go:52] "Watching apiserver" May 17 00:33:23.886440 kubelet[1947]: I0517 00:33:23.886408 1947 desired_state_of_world_populator.go:155] "Finished populating initial desired state of world" May 17 00:33:23.940934 kubelet[1947]: E0517 00:33:23.940900 1947 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 17 00:33:23.941341 kubelet[1947]: E0517 00:33:23.941325 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:23.943643 kubelet[1947]: E0517 00:33:23.943600 1947 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 17 00:33:23.943828 kubelet[1947]: E0517 00:33:23.943717 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:23.943828 kubelet[1947]: E0517 00:33:23.943797 1947 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 17 00:33:23.943924 kubelet[1947]: E0517 00:33:23.943884 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:23.958562 kubelet[1947]: I0517 00:33:23.958498 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.958427705 podStartE2EDuration="1.958427705s" podCreationTimestamp="2025-05-17 00:33:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:23.958384533 +0000 UTC m=+1.133738024" watchObservedRunningTime="2025-05-17 00:33:23.958427705 +0000 UTC m=+1.133781196" May 17 00:33:23.973593 kubelet[1947]: I0517 00:33:23.973535 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.9735167310000001 podStartE2EDuration="1.973516731s" podCreationTimestamp="2025-05-17 00:33:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:23.96466884 +0000 UTC m=+1.140022331" watchObservedRunningTime="2025-05-17 00:33:23.973516731 +0000 UTC m=+1.148870222" May 17 00:33:23.980563 kubelet[1947]: I0517 00:33:23.980519 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.98050676 podStartE2EDuration="1.98050676s" podCreationTimestamp="2025-05-17 00:33:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:23.973633334 +0000 UTC m=+1.148986825" watchObservedRunningTime="2025-05-17 00:33:23.98050676 +0000 UTC m=+1.155860241" May 17 00:33:24.911722 kubelet[1947]: E0517 00:33:24.911692 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:24.912198 kubelet[1947]: E0517 00:33:24.911692 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:24.912304 kubelet[1947]: E0517 00:33:24.911764 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:27.407000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:33:27.409537 kernel: kauditd_printk_skb: 266 callbacks suppressed May 17 00:33:27.409591 kernel: audit: type=1400 audit(1747442007.407:808): avc: denied { watch } for pid=1776 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 17 00:33:27.407000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dc57c0 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.420951 kernel: audit: type=1300 audit(1747442007.407:808): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000dc57c0 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.420983 kernel: audit: type=1327 audit(1747442007.407:808): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:27.407000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:27.758000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:27.758000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00141d4e0 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.767495 kernel: audit: type=1400 audit(1747442007.758:809): avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:27.767540 kernel: audit: type=1300 audit(1747442007.758:809): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00141d4e0 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.767560 kernel: audit: type=1327 audit(1747442007.758:809): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:27.758000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:27.758000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:27.775212 kernel: audit: type=1400 audit(1747442007.758:810): avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:27.775285 kernel: audit: type=1300 audit(1747442007.758:810): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00181a420 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.758000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00181a420 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.758000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:27.784122 kernel: audit: type=1327 audit(1747442007.758:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:27.784165 kernel: audit: type=1400 audit(1747442007.759:811): avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:27.759000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:27.759000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00141d500 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:27.759000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:33:27.759000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019499c0 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:33:27.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:33:28.032701 kubelet[1947]: I0517 00:33:28.032596 1947 kuberuntime_manager.go:1635] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 17 00:33:28.033023 env[1200]: time="2025-05-17T00:33:28.032986728Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 17 00:33:28.033406 kubelet[1947]: I0517 00:33:28.033373 1947 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 17 00:33:29.024971 systemd[1]: Created slice kubepods-besteffort-pode457eaaa_10b0_4383_a595_b20a56eadfe2.slice. May 17 00:33:29.125410 kubelet[1947]: I0517 00:33:29.125345 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e457eaaa-10b0-4383-a595-b20a56eadfe2-xtables-lock\") pod \"kube-proxy-hlc4v\" (UID: \"e457eaaa-10b0-4383-a595-b20a56eadfe2\") " pod="kube-system/kube-proxy-hlc4v" May 17 00:33:29.125410 kubelet[1947]: I0517 00:33:29.125397 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e457eaaa-10b0-4383-a595-b20a56eadfe2-lib-modules\") pod \"kube-proxy-hlc4v\" (UID: \"e457eaaa-10b0-4383-a595-b20a56eadfe2\") " pod="kube-system/kube-proxy-hlc4v" May 17 00:33:29.125824 kubelet[1947]: I0517 00:33:29.125428 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wm79m\" (UniqueName: \"kubernetes.io/projected/e457eaaa-10b0-4383-a595-b20a56eadfe2-kube-api-access-wm79m\") pod \"kube-proxy-hlc4v\" (UID: \"e457eaaa-10b0-4383-a595-b20a56eadfe2\") " pod="kube-system/kube-proxy-hlc4v" May 17 00:33:29.125824 kubelet[1947]: I0517 00:33:29.125451 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e457eaaa-10b0-4383-a595-b20a56eadfe2-kube-proxy\") pod \"kube-proxy-hlc4v\" (UID: \"e457eaaa-10b0-4383-a595-b20a56eadfe2\") " pod="kube-system/kube-proxy-hlc4v" May 17 00:33:29.140401 systemd[1]: Created slice kubepods-besteffort-poda3bf8bcc_4415_43cf_9855_49f4b585e685.slice. May 17 00:33:29.226080 kubelet[1947]: I0517 00:33:29.226014 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/a3bf8bcc-4415-43cf-9855-49f4b585e685-var-lib-calico\") pod \"tigera-operator-7c5755cdcb-767z5\" (UID: \"a3bf8bcc-4415-43cf-9855-49f4b585e685\") " pod="tigera-operator/tigera-operator-7c5755cdcb-767z5" May 17 00:33:29.226080 kubelet[1947]: I0517 00:33:29.226079 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pzhls\" (UniqueName: \"kubernetes.io/projected/a3bf8bcc-4415-43cf-9855-49f4b585e685-kube-api-access-pzhls\") pod \"tigera-operator-7c5755cdcb-767z5\" (UID: \"a3bf8bcc-4415-43cf-9855-49f4b585e685\") " pod="tigera-operator/tigera-operator-7c5755cdcb-767z5" May 17 00:33:29.230595 kubelet[1947]: I0517 00:33:29.230564 1947 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 17 00:33:29.331402 kubelet[1947]: E0517 00:33:29.331361 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:29.331879 env[1200]: time="2025-05-17T00:33:29.331844602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hlc4v,Uid:e457eaaa-10b0-4383-a595-b20a56eadfe2,Namespace:kube-system,Attempt:0,}" May 17 00:33:29.345000 env[1200]: time="2025-05-17T00:33:29.344925788Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:29.345000 env[1200]: time="2025-05-17T00:33:29.344957779Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:29.345000 env[1200]: time="2025-05-17T00:33:29.344966937Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:29.345188 env[1200]: time="2025-05-17T00:33:29.345082567Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/743cc8fc33ef3b4f2a991dd3b1642c08c14ecf5c5405b00e671ff1c7802bca25 pid=2003 runtime=io.containerd.runc.v2 May 17 00:33:29.357017 systemd[1]: Started cri-containerd-743cc8fc33ef3b4f2a991dd3b1642c08c14ecf5c5405b00e671ff1c7802bca25.scope. May 17 00:33:29.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.362000 audit: BPF prog-id=106 op=LOAD May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2003 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336363386663333365663362346632613939316464336231363432 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2003 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336363386663333365663362346632613939316464336231363432 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit: BPF prog-id=107 op=LOAD May 17 00:33:29.363000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c000309700 items=0 ppid=2003 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336363386663333365663362346632613939316464336231363432 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit: BPF prog-id=108 op=LOAD May 17 00:33:29.363000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000309748 items=0 ppid=2003 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336363386663333365663362346632613939316464336231363432 May 17 00:33:29.363000 audit: BPF prog-id=108 op=UNLOAD May 17 00:33:29.363000 audit: BPF prog-id=107 op=UNLOAD May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { perfmon } for pid=2012 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit[2012]: AVC avc: denied { bpf } for pid=2012 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.363000 audit: BPF prog-id=109 op=LOAD May 17 00:33:29.363000 audit[2012]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000309b58 items=0 ppid=2003 pid=2012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.363000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734336363386663333365663362346632613939316464336231363432 May 17 00:33:29.371739 env[1200]: time="2025-05-17T00:33:29.371711115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hlc4v,Uid:e457eaaa-10b0-4383-a595-b20a56eadfe2,Namespace:kube-system,Attempt:0,} returns sandbox id \"743cc8fc33ef3b4f2a991dd3b1642c08c14ecf5c5405b00e671ff1c7802bca25\"" May 17 00:33:29.372439 kubelet[1947]: E0517 00:33:29.372419 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:29.374861 env[1200]: time="2025-05-17T00:33:29.374838350Z" level=info msg="CreateContainer within sandbox \"743cc8fc33ef3b4f2a991dd3b1642c08c14ecf5c5405b00e671ff1c7802bca25\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 17 00:33:29.390453 env[1200]: time="2025-05-17T00:33:29.390405338Z" level=info msg="CreateContainer within sandbox \"743cc8fc33ef3b4f2a991dd3b1642c08c14ecf5c5405b00e671ff1c7802bca25\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"526829a566d7776eb1cd0330785c2e9f5965b240d78b398feaea2e5de8f78da3\"" May 17 00:33:29.390898 env[1200]: time="2025-05-17T00:33:29.390877036Z" level=info msg="StartContainer for \"526829a566d7776eb1cd0330785c2e9f5965b240d78b398feaea2e5de8f78da3\"" May 17 00:33:29.403301 systemd[1]: Started cri-containerd-526829a566d7776eb1cd0330785c2e9f5965b240d78b398feaea2e5de8f78da3.scope. May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f11b4842c68 items=0 ppid=2003 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363832396135363664373737366562316364303333303738356332 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit: BPF prog-id=110 op=LOAD May 17 00:33:29.415000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000098c18 items=0 ppid=2003 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363832396135363664373737366562316364303333303738356332 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit: BPF prog-id=111 op=LOAD May 17 00:33:29.415000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000098c68 items=0 ppid=2003 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363832396135363664373737366562316364303333303738356332 May 17 00:33:29.415000 audit: BPF prog-id=111 op=UNLOAD May 17 00:33:29.415000 audit: BPF prog-id=110 op=UNLOAD May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { perfmon } for pid=2043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit[2043]: AVC avc: denied { bpf } for pid=2043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.415000 audit: BPF prog-id=112 op=LOAD May 17 00:33:29.415000 audit[2043]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098cf8 items=0 ppid=2003 pid=2043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363832396135363664373737366562316364303333303738356332 May 17 00:33:29.426952 env[1200]: time="2025-05-17T00:33:29.426910582Z" level=info msg="StartContainer for \"526829a566d7776eb1cd0330785c2e9f5965b240d78b398feaea2e5de8f78da3\" returns successfully" May 17 00:33:29.443216 env[1200]: time="2025-05-17T00:33:29.443177473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-767z5,Uid:a3bf8bcc-4415-43cf-9855-49f4b585e685,Namespace:tigera-operator,Attempt:0,}" May 17 00:33:29.457765 env[1200]: time="2025-05-17T00:33:29.457707637Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:29.457959 env[1200]: time="2025-05-17T00:33:29.457927886Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:29.458061 env[1200]: time="2025-05-17T00:33:29.457947193Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:29.458394 env[1200]: time="2025-05-17T00:33:29.458270068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e3febd93d5bea6ef439f223db5aee19680a1f0e03955400c8834346c779368e3 pid=2081 runtime=io.containerd.runc.v2 May 17 00:33:29.467724 systemd[1]: Started cri-containerd-e3febd93d5bea6ef439f223db5aee19680a1f0e03955400c8834346c779368e3.scope. May 17 00:33:29.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.477000 audit: BPF prog-id=113 op=LOAD May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2081 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533666562643933643562656136656634333966323233646235616565 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2081 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533666562643933643562656136656634333966323233646235616565 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit: BPF prog-id=114 op=LOAD May 17 00:33:29.478000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c000335d10 items=0 ppid=2081 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533666562643933643562656136656634333966323233646235616565 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit: BPF prog-id=115 op=LOAD May 17 00:33:29.478000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c000335d58 items=0 ppid=2081 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533666562643933643562656136656634333966323233646235616565 May 17 00:33:29.478000 audit: BPF prog-id=115 op=UNLOAD May 17 00:33:29.478000 audit: BPF prog-id=114 op=UNLOAD May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { perfmon } for pid=2094 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit[2094]: AVC avc: denied { bpf } for pid=2094 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:29.478000 audit: BPF prog-id=116 op=LOAD May 17 00:33:29.478000 audit[2094]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0003ba168 items=0 ppid=2081 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533666562643933643562656136656634333966323233646235616565 May 17 00:33:29.500540 env[1200]: time="2025-05-17T00:33:29.500500592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7c5755cdcb-767z5,Uid:a3bf8bcc-4415-43cf-9855-49f4b585e685,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e3febd93d5bea6ef439f223db5aee19680a1f0e03955400c8834346c779368e3\"" May 17 00:33:29.502093 env[1200]: time="2025-05-17T00:33:29.502074559Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\"" May 17 00:33:29.513000 audit[2146]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2146 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.513000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1b336880 a2=0 a3=7ffe1b33686c items=0 ppid=2053 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:33:29.514000 audit[2148]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2148 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.514000 audit[2148]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4b8e3890 a2=0 a3=7fff4b8e387c items=0 ppid=2053 pid=2148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.514000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:33:29.514000 audit[2147]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.514000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd55a56d10 a2=0 a3=7ffd55a56cfc items=0 ppid=2053 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.514000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 17 00:33:29.515000 audit[2149]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.515000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc45b4fe80 a2=0 a3=7ffc45b4fe6c items=0 ppid=2053 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.515000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 17 00:33:29.515000 audit[2150]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.515000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc3cb8c20 a2=0 a3=66bdbc5916b46dae items=0 ppid=2053 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.515000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:33:29.516000 audit[2151]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.516000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd4e4e4ee0 a2=0 a3=7ffd4e4e4ecc items=0 ppid=2053 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 17 00:33:29.614000 audit[2152]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.614000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffe97370c0 a2=0 a3=7fffe97370ac items=0 ppid=2053 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.614000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:33:29.616000 audit[2154]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.616000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff7631d270 a2=0 a3=7fff7631d25c items=0 ppid=2053 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.616000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 17 00:33:29.619000 audit[2157]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.619000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffed67725f0 a2=0 a3=7ffed67725dc items=0 ppid=2053 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.619000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 17 00:33:29.620000 audit[2158]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.620000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe26d13950 a2=0 a3=7ffe26d1393c items=0 ppid=2053 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.620000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:33:29.622000 audit[2160]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.622000 audit[2160]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf576f740 a2=0 a3=7ffcf576f72c items=0 ppid=2053 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:33:29.622000 audit[2161]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.622000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe022917b0 a2=0 a3=7ffe0229179c items=0 ppid=2053 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.622000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:33:29.624000 audit[2163]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.624000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee060f860 a2=0 a3=7ffee060f84c items=0 ppid=2053 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.624000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:33:29.627000 audit[2166]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2166 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.627000 audit[2166]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc59efac80 a2=0 a3=7ffc59efac6c items=0 ppid=2053 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.627000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 17 00:33:29.628000 audit[2167]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.628000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffef194f7d0 a2=0 a3=7ffef194f7bc items=0 ppid=2053 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.628000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:33:29.629000 audit[2169]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.629000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc8771bf0 a2=0 a3=7ffcc8771bdc items=0 ppid=2053 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.629000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:33:29.630000 audit[2170]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.630000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdec7dad40 a2=0 a3=7ffdec7dad2c items=0 ppid=2053 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.630000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:33:29.632000 audit[2172]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.632000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd15ef0de0 a2=0 a3=7ffd15ef0dcc items=0 ppid=2053 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.632000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:33:29.634000 audit[2175]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.634000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd29b18a0 a2=0 a3=7fffd29b188c items=0 ppid=2053 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.634000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:33:29.637000 audit[2178]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.637000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff79eb0e30 a2=0 a3=7fff79eb0e1c items=0 ppid=2053 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.637000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:33:29.638000 audit[2179]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.638000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff87da5300 a2=0 a3=7fff87da52ec items=0 ppid=2053 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.638000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:33:29.640000 audit[2181]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.640000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffcbf090de0 a2=0 a3=7ffcbf090dcc items=0 ppid=2053 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.640000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:29.642000 audit[2184]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.642000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe120fdcd0 a2=0 a3=7ffe120fdcbc items=0 ppid=2053 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.642000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:29.643000 audit[2185]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.643000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc586bea40 a2=0 a3=7ffc586bea2c items=0 ppid=2053 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:33:29.645000 audit[2187]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 17 00:33:29.645000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff87633e90 a2=0 a3=7fff87633e7c items=0 ppid=2053 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.645000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:33:29.663000 audit[2193]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:29.663000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff2c440470 a2=0 a3=7fff2c44045c items=0 ppid=2053 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.663000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:29.671000 audit[2193]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:29.671000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff2c440470 a2=0 a3=7fff2c44045c items=0 ppid=2053 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.671000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:29.672000 audit[2198]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.672000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc917620b0 a2=0 a3=7ffc9176209c items=0 ppid=2053 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 17 00:33:29.674000 audit[2200]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.674000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff4238b130 a2=0 a3=7fff4238b11c items=0 ppid=2053 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 17 00:33:29.677000 audit[2203]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.677000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe475e69f0 a2=0 a3=7ffe475e69dc items=0 ppid=2053 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.677000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 17 00:33:29.678000 audit[2204]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2204 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.678000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea7c18980 a2=0 a3=7ffea7c1896c items=0 ppid=2053 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.678000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 17 00:33:29.679000 audit[2206]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.679000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe82198180 a2=0 a3=7ffe8219816c items=0 ppid=2053 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 17 00:33:29.680000 audit[2207]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.680000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc35813600 a2=0 a3=7ffc358135ec items=0 ppid=2053 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 17 00:33:29.682000 audit[2209]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2209 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.682000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe3b754fe0 a2=0 a3=7ffe3b754fcc items=0 ppid=2053 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.682000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 17 00:33:29.684000 audit[2212]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.684000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe0e289da0 a2=0 a3=7ffe0e289d8c items=0 ppid=2053 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.684000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 17 00:33:29.685000 audit[2213]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.685000 audit[2213]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1bf926a0 a2=0 a3=7ffe1bf9268c items=0 ppid=2053 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.685000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 17 00:33:29.687000 audit[2215]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.687000 audit[2215]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea70463c0 a2=0 a3=7ffea70463ac items=0 ppid=2053 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 17 00:33:29.688000 audit[2216]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.688000 audit[2216]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2ca28210 a2=0 a3=7ffe2ca281fc items=0 ppid=2053 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.688000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 17 00:33:29.690000 audit[2218]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.690000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdaa186bf0 a2=0 a3=7ffdaa186bdc items=0 ppid=2053 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.690000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 17 00:33:29.692000 audit[2221]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.692000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff64933af0 a2=0 a3=7fff64933adc items=0 ppid=2053 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 17 00:33:29.695000 audit[2224]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.695000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd9ef27280 a2=0 a3=7ffd9ef2726c items=0 ppid=2053 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 17 00:33:29.695000 audit[2225]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.695000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdf9a68410 a2=0 a3=7ffdf9a683fc items=0 ppid=2053 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.695000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 17 00:33:29.697000 audit[2227]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.697000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe6409c550 a2=0 a3=7ffe6409c53c items=0 ppid=2053 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:29.699000 audit[2230]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.699000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe876bead0 a2=0 a3=7ffe876beabc items=0 ppid=2053 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.699000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 17 00:33:29.700000 audit[2231]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.700000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdf8d1c50 a2=0 a3=7fffdf8d1c3c items=0 ppid=2053 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.700000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 17 00:33:29.702000 audit[2233]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.702000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff5d7ea850 a2=0 a3=7fff5d7ea83c items=0 ppid=2053 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 17 00:33:29.703000 audit[2234]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.703000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6a032ef0 a2=0 a3=7ffe6a032edc items=0 ppid=2053 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 17 00:33:29.704000 audit[2236]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.704000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc86bb46e0 a2=0 a3=7ffc86bb46cc items=0 ppid=2053 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.704000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:29.707000 audit[2239]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 17 00:33:29.707000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea2b94d50 a2=0 a3=7ffea2b94d3c items=0 ppid=2053 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.707000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 17 00:33:29.709000 audit[2241]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:33:29.709000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffdb7498d80 a2=0 a3=7ffdb7498d6c items=0 ppid=2053 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.709000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:29.709000 audit[2241]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 17 00:33:29.709000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffdb7498d80 a2=0 a3=7ffdb7498d6c items=0 ppid=2053 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:29.709000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:29.920619 kubelet[1947]: E0517 00:33:29.920504 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:29.928065 kubelet[1947]: I0517 00:33:29.928004 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hlc4v" podStartSLOduration=0.927984553 podStartE2EDuration="927.984553ms" podCreationTimestamp="2025-05-17 00:33:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:33:29.927636672 +0000 UTC m=+7.102990163" watchObservedRunningTime="2025-05-17 00:33:29.927984553 +0000 UTC m=+7.103338044" May 17 00:33:30.926074 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2568649222.mount: Deactivated successfully. May 17 00:33:31.649519 env[1200]: time="2025-05-17T00:33:31.649466725Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:31.651260 env[1200]: time="2025-05-17T00:33:31.651203075Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:31.653799 env[1200]: time="2025-05-17T00:33:31.653762820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.38.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:31.655460 env[1200]: time="2025-05-17T00:33:31.655429558Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:e0a34b265aebce1a2db906d8dad99190706e8bf3910cae626b9c2eb6bbb21775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:31.655857 env[1200]: time="2025-05-17T00:33:31.655804862Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.38.0\" returns image reference \"sha256:5e43c1322619406528ff596056dfeb70cb8d20c5c00439feb752a7725302e033\"" May 17 00:33:31.659497 env[1200]: time="2025-05-17T00:33:31.659462323Z" level=info msg="CreateContainer within sandbox \"e3febd93d5bea6ef439f223db5aee19680a1f0e03955400c8834346c779368e3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 17 00:33:31.669961 env[1200]: time="2025-05-17T00:33:31.669897817Z" level=info msg="CreateContainer within sandbox \"e3febd93d5bea6ef439f223db5aee19680a1f0e03955400c8834346c779368e3\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023\"" May 17 00:33:31.670408 env[1200]: time="2025-05-17T00:33:31.670380314Z" level=info msg="StartContainer for \"cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023\"" May 17 00:33:31.685994 systemd[1]: run-containerd-runc-k8s.io-cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023-runc.6IISRu.mount: Deactivated successfully. May 17 00:33:31.689522 systemd[1]: Started cri-containerd-cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023.scope. May 17 00:33:31.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit: BPF prog-id=117 op=LOAD May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2081 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:31.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623732363539656134396633623363643835643839303363346665 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2081 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:31.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623732363539656134396633623363643835643839303363346665 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit: BPF prog-id=118 op=LOAD May 17 00:33:31.698000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024cc40 items=0 ppid=2081 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:31.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623732363539656134396633623363643835643839303363346665 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit: BPF prog-id=119 op=LOAD May 17 00:33:31.698000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024cc88 items=0 ppid=2081 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:31.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623732363539656134396633623363643835643839303363346665 May 17 00:33:31.698000 audit: BPF prog-id=119 op=UNLOAD May 17 00:33:31.698000 audit: BPF prog-id=118 op=UNLOAD May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { perfmon } for pid=2249 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit[2249]: AVC avc: denied { bpf } for pid=2249 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:31.698000 audit: BPF prog-id=120 op=LOAD May 17 00:33:31.698000 audit[2249]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00024d098 items=0 ppid=2081 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:31.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364623732363539656134396633623363643835643839303363346665 May 17 00:33:31.712260 env[1200]: time="2025-05-17T00:33:31.712212641Z" level=info msg="StartContainer for \"cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023\" returns successfully" May 17 00:33:31.932899 kubelet[1947]: I0517 00:33:31.932739 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7c5755cdcb-767z5" podStartSLOduration=0.777229088 podStartE2EDuration="2.932717774s" podCreationTimestamp="2025-05-17 00:33:29 +0000 UTC" firstStartedPulling="2025-05-17 00:33:29.501604874 +0000 UTC m=+6.676958366" lastFinishedPulling="2025-05-17 00:33:31.657093561 +0000 UTC m=+8.832447052" observedRunningTime="2025-05-17 00:33:31.932482586 +0000 UTC m=+9.107836078" watchObservedRunningTime="2025-05-17 00:33:31.932717774 +0000 UTC m=+9.108071265" May 17 00:33:32.246948 kubelet[1947]: E0517 00:33:32.246819 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:32.925405 kubelet[1947]: E0517 00:33:32.925361 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:33.586287 kubelet[1947]: E0517 00:33:33.586246 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:33.616917 kubelet[1947]: E0517 00:33:33.616885 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:33.705195 systemd[1]: cri-containerd-cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023.scope: Deactivated successfully. May 17 00:33:33.704000 audit: BPF prog-id=117 op=UNLOAD May 17 00:33:33.707397 kernel: kauditd_printk_skb: 372 callbacks suppressed May 17 00:33:33.707537 kernel: audit: type=1334 audit(1747442013.704:924): prog-id=117 op=UNLOAD May 17 00:33:33.710000 audit: BPF prog-id=120 op=UNLOAD May 17 00:33:33.713052 kernel: audit: type=1334 audit(1747442013.710:925): prog-id=120 op=UNLOAD May 17 00:33:33.725741 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023-rootfs.mount: Deactivated successfully. May 17 00:33:33.779834 env[1200]: time="2025-05-17T00:33:33.779776570Z" level=info msg="shim disconnected" id=cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023 May 17 00:33:33.779834 env[1200]: time="2025-05-17T00:33:33.779826094Z" level=warning msg="cleaning up after shim disconnected" id=cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023 namespace=k8s.io May 17 00:33:33.779834 env[1200]: time="2025-05-17T00:33:33.779834711Z" level=info msg="cleaning up dead shim" May 17 00:33:33.797488 env[1200]: time="2025-05-17T00:33:33.797430792Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:33:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2297 runtime=io.containerd.runc.v2\n" May 17 00:33:33.928172 kubelet[1947]: I0517 00:33:33.928044 1947 scope.go:117] "RemoveContainer" containerID="cdb72659ea49f3b3cd85d8903c4fe73d0231dc93e5d7f04c5d05331a8ca79023" May 17 00:33:33.929357 env[1200]: time="2025-05-17T00:33:33.929316750Z" level=info msg="CreateContainer within sandbox \"e3febd93d5bea6ef439f223db5aee19680a1f0e03955400c8834346c779368e3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" May 17 00:33:33.946329 env[1200]: time="2025-05-17T00:33:33.946267277Z" level=info msg="CreateContainer within sandbox \"e3febd93d5bea6ef439f223db5aee19680a1f0e03955400c8834346c779368e3\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"f516aeffc70869c00d7a881b873b129f4394525aba8fe0c43428a03365a7683f\"" May 17 00:33:33.946974 env[1200]: time="2025-05-17T00:33:33.946955642Z" level=info msg="StartContainer for \"f516aeffc70869c00d7a881b873b129f4394525aba8fe0c43428a03365a7683f\"" May 17 00:33:33.972366 systemd[1]: Started cri-containerd-f516aeffc70869c00d7a881b873b129f4394525aba8fe0c43428a03365a7683f.scope. May 17 00:33:33.999376 kernel: audit: type=1400 audit(1747442013.992:926): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999485 kernel: audit: type=1400 audit(1747442013.992:927): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.002467 kernel: audit: type=1400 audit(1747442013.992:928): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.005438 kernel: audit: type=1400 audit(1747442013.992:929): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008481 kernel: audit: type=1400 audit(1747442013.992:930): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.011503 kernel: audit: type=1400 audit(1747442013.992:931): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.014570 kernel: audit: type=1400 audit(1747442013.992:932): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.019085 kernel: audit: type=1400 audit(1747442013.992:933): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit: BPF prog-id=121 op=LOAD May 17 00:33:33.999000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2081 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313661656666633730383639633030643761383831623837336231 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2081 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313661656666633730383639633030643761383831623837336231 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:33.999000 audit: BPF prog-id=122 op=LOAD May 17 00:33:33.999000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00028e9d0 items=0 ppid=2081 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:33.999000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313661656666633730383639633030643761383831623837336231 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit: BPF prog-id=123 op=LOAD May 17 00:33:34.008000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00028ea18 items=0 ppid=2081 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:34.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313661656666633730383639633030643761383831623837336231 May 17 00:33:34.008000 audit: BPF prog-id=123 op=UNLOAD May 17 00:33:34.008000 audit: BPF prog-id=122 op=UNLOAD May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:34.008000 audit: BPF prog-id=124 op=LOAD May 17 00:33:34.008000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00028ee28 items=0 ppid=2081 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:34.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635313661656666633730383639633030643761383831623837336231 May 17 00:33:34.044056 env[1200]: time="2025-05-17T00:33:34.043987963Z" level=info msg="StartContainer for \"f516aeffc70869c00d7a881b873b129f4394525aba8fe0c43428a03365a7683f\" returns successfully" May 17 00:33:36.532225 update_engine[1191]: I0517 00:33:36.532176 1191 update_attempter.cc:509] Updating boot flags... May 17 00:33:36.824000 audit[1336]: USER_END pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:33:36.824000 audit[1336]: CRED_DISP pid=1336 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 17 00:33:36.825006 sudo[1336]: pam_unix(sudo:session): session closed for user root May 17 00:33:36.826808 sshd[1333]: pam_unix(sshd:session): session closed for user core May 17 00:33:36.826000 audit[1333]: USER_END pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:36.826000 audit[1333]: CRED_DISP pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:36.829188 systemd[1]: sshd@6-10.0.0.99:22-10.0.0.1:54960.service: Deactivated successfully. May 17 00:33:36.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.99:22-10.0.0.1:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:36.829816 systemd[1]: session-7.scope: Deactivated successfully. May 17 00:33:36.829945 systemd[1]: session-7.scope: Consumed 4.172s CPU time. May 17 00:33:36.830461 systemd-logind[1188]: Session 7 logged out. Waiting for processes to exit. May 17 00:33:36.831194 systemd-logind[1188]: Removed session 7. May 17 00:33:37.732000 audit[2415]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:37.732000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fff1b2028b0 a2=0 a3=7fff1b20289c items=0 ppid=2053 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:37.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:37.737000 audit[2415]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:37.737000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff1b2028b0 a2=0 a3=0 items=0 ppid=2053 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:37.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:37.825000 audit[2417]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:37.825000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffee85833b0 a2=0 a3=7ffee858339c items=0 ppid=2053 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:37.825000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:37.830000 audit[2417]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2417 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:37.830000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffee85833b0 a2=0 a3=0 items=0 ppid=2053 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:37.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.533108 kernel: kauditd_printk_skb: 66 callbacks suppressed May 17 00:33:39.533274 kernel: audit: type=1325 audit(1747442019.525:953): table=filter:93 family=2 entries=17 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.533304 kernel: audit: type=1300 audit(1747442019.525:953): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd856b01d0 a2=0 a3=7ffd856b01bc items=0 ppid=2053 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:39.525000 audit[2419]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.525000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd856b01d0 a2=0 a3=7ffd856b01bc items=0 ppid=2053 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:39.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.542042 kernel: audit: type=1327 audit(1747442019.525:953): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.542000 audit[2419]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.542000 audit[2419]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd856b01d0 a2=0 a3=0 items=0 ppid=2053 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:39.553835 kernel: audit: type=1325 audit(1747442019.542:954): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.553903 kernel: audit: type=1300 audit(1747442019.542:954): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd856b01d0 a2=0 a3=0 items=0 ppid=2053 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:39.542000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.557053 kernel: audit: type=1327 audit(1747442019.542:954): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.863000 audit[2421]: NETFILTER_CFG table=filter:95 family=2 entries=20 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.863000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffde8b76120 a2=0 a3=7ffde8b7610c items=0 ppid=2053 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:39.873375 kernel: audit: type=1325 audit(1747442019.863:955): table=filter:95 family=2 entries=20 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.873514 kernel: audit: type=1300 audit(1747442019.863:955): arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffde8b76120 a2=0 a3=7ffde8b7610c items=0 ppid=2053 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:39.873560 kernel: audit: type=1327 audit(1747442019.863:955): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.872000 audit[2421]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.881149 kernel: audit: type=1325 audit(1747442019.872:956): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2421 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:39.872000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde8b76120 a2=0 a3=0 items=0 ppid=2053 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:39.872000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:39.884996 systemd[1]: Created slice kubepods-besteffort-pod1604b588_30ff_45ec_8685_69f4b4828a5d.slice. May 17 00:33:39.898417 kubelet[1947]: I0517 00:33:39.898315 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xmdzk\" (UniqueName: \"kubernetes.io/projected/1604b588-30ff-45ec-8685-69f4b4828a5d-kube-api-access-xmdzk\") pod \"calico-typha-55b9c49599-7tw4k\" (UID: \"1604b588-30ff-45ec-8685-69f4b4828a5d\") " pod="calico-system/calico-typha-55b9c49599-7tw4k" May 17 00:33:39.898417 kubelet[1947]: I0517 00:33:39.898369 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/1604b588-30ff-45ec-8685-69f4b4828a5d-typha-certs\") pod \"calico-typha-55b9c49599-7tw4k\" (UID: \"1604b588-30ff-45ec-8685-69f4b4828a5d\") " pod="calico-system/calico-typha-55b9c49599-7tw4k" May 17 00:33:39.898417 kubelet[1947]: I0517 00:33:39.898393 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1604b588-30ff-45ec-8685-69f4b4828a5d-tigera-ca-bundle\") pod \"calico-typha-55b9c49599-7tw4k\" (UID: \"1604b588-30ff-45ec-8685-69f4b4828a5d\") " pod="calico-system/calico-typha-55b9c49599-7tw4k" May 17 00:33:40.137009 systemd[1]: Created slice kubepods-besteffort-pod310b6d3f_688f_49a6_9795_7d60c9c81c7c.slice. May 17 00:33:40.188255 kubelet[1947]: E0517 00:33:40.188223 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:40.188761 env[1200]: time="2025-05-17T00:33:40.188714365Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-55b9c49599-7tw4k,Uid:1604b588-30ff-45ec-8685-69f4b4828a5d,Namespace:calico-system,Attempt:0,}" May 17 00:33:40.201649 kubelet[1947]: I0517 00:33:40.201619 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-cni-log-dir\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.201909 kubelet[1947]: I0517 00:33:40.201886 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hrtpb\" (UniqueName: \"kubernetes.io/projected/310b6d3f-688f-49a6-9795-7d60c9c81c7c-kube-api-access-hrtpb\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202051 kubelet[1947]: I0517 00:33:40.202017 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-cni-bin-dir\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202196 kubelet[1947]: I0517 00:33:40.202176 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-xtables-lock\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202294 kubelet[1947]: I0517 00:33:40.202275 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/310b6d3f-688f-49a6-9795-7d60c9c81c7c-node-certs\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202395 kubelet[1947]: I0517 00:33:40.202377 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-var-lib-calico\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202490 kubelet[1947]: I0517 00:33:40.202472 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-cni-net-dir\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202582 kubelet[1947]: I0517 00:33:40.202565 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-flexvol-driver-host\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202668 kubelet[1947]: I0517 00:33:40.202650 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-lib-modules\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202759 kubelet[1947]: I0517 00:33:40.202740 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-policysync\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202863 kubelet[1947]: I0517 00:33:40.202842 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/310b6d3f-688f-49a6-9795-7d60c9c81c7c-tigera-ca-bundle\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.202954 kubelet[1947]: I0517 00:33:40.202935 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/310b6d3f-688f-49a6-9795-7d60c9c81c7c-var-run-calico\") pod \"calico-node-q5wvd\" (UID: \"310b6d3f-688f-49a6-9795-7d60c9c81c7c\") " pod="calico-system/calico-node-q5wvd" May 17 00:33:40.207221 env[1200]: time="2025-05-17T00:33:40.207150167Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:40.207221 env[1200]: time="2025-05-17T00:33:40.207191556Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:40.207221 env[1200]: time="2025-05-17T00:33:40.207201936Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:40.207434 env[1200]: time="2025-05-17T00:33:40.207386935Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/999875fb7d93d5e31f29a40ae014a7fc7256a9f4076da02fc42692cc12c1a83e pid=2431 runtime=io.containerd.runc.v2 May 17 00:33:40.221550 systemd[1]: Started cri-containerd-999875fb7d93d5e31f29a40ae014a7fc7256a9f4076da02fc42692cc12c1a83e.scope. May 17 00:33:40.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit: BPF prog-id=125 op=LOAD May 17 00:33:40.229000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.229000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2431 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939393837356662376439336435653331663239613430616530313461 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2431 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939393837356662376439336435653331663239613430616530313461 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit: BPF prog-id=126 op=LOAD May 17 00:33:40.230000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024650 items=0 ppid=2431 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939393837356662376439336435653331663239613430616530313461 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit: BPF prog-id=127 op=LOAD May 17 00:33:40.230000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024698 items=0 ppid=2431 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939393837356662376439336435653331663239613430616530313461 May 17 00:33:40.230000 audit: BPF prog-id=127 op=UNLOAD May 17 00:33:40.230000 audit: BPF prog-id=126 op=UNLOAD May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { perfmon } for pid=2440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit[2440]: AVC avc: denied { bpf } for pid=2440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.230000 audit: BPF prog-id=128 op=LOAD May 17 00:33:40.230000 audit[2440]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024aa8 items=0 ppid=2431 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939393837356662376439336435653331663239613430616530313461 May 17 00:33:40.252753 env[1200]: time="2025-05-17T00:33:40.252513612Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-55b9c49599-7tw4k,Uid:1604b588-30ff-45ec-8685-69f4b4828a5d,Namespace:calico-system,Attempt:0,} returns sandbox id \"999875fb7d93d5e31f29a40ae014a7fc7256a9f4076da02fc42692cc12c1a83e\"" May 17 00:33:40.254069 kubelet[1947]: E0517 00:33:40.254043 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:40.256134 env[1200]: time="2025-05-17T00:33:40.255056919Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\"" May 17 00:33:40.308502 kubelet[1947]: E0517 00:33:40.308470 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.308502 kubelet[1947]: W0517 00:33:40.308494 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.308502 kubelet[1947]: E0517 00:33:40.308520 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.311847 kubelet[1947]: E0517 00:33:40.311618 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.311847 kubelet[1947]: W0517 00:33:40.311638 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.311847 kubelet[1947]: E0517 00:33:40.311659 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.323927 kubelet[1947]: E0517 00:33:40.323871 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:40.397803 kubelet[1947]: E0517 00:33:40.397690 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.397803 kubelet[1947]: W0517 00:33:40.397710 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.397803 kubelet[1947]: E0517 00:33:40.397734 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.397981 kubelet[1947]: E0517 00:33:40.397957 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.397981 kubelet[1947]: W0517 00:33:40.397964 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.397981 kubelet[1947]: E0517 00:33:40.397971 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.398125 kubelet[1947]: E0517 00:33:40.398110 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.398125 kubelet[1947]: W0517 00:33:40.398121 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.398184 kubelet[1947]: E0517 00:33:40.398129 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.398320 kubelet[1947]: E0517 00:33:40.398287 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.398320 kubelet[1947]: W0517 00:33:40.398311 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.398499 kubelet[1947]: E0517 00:33:40.398337 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.398611 kubelet[1947]: E0517 00:33:40.398591 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.398611 kubelet[1947]: W0517 00:33:40.398607 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.398687 kubelet[1947]: E0517 00:33:40.398618 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.398792 kubelet[1947]: E0517 00:33:40.398771 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.398792 kubelet[1947]: W0517 00:33:40.398787 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.398874 kubelet[1947]: E0517 00:33:40.398799 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.398973 kubelet[1947]: E0517 00:33:40.398954 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.398973 kubelet[1947]: W0517 00:33:40.398970 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.399083 kubelet[1947]: E0517 00:33:40.398980 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.399136 kubelet[1947]: E0517 00:33:40.399122 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.399136 kubelet[1947]: W0517 00:33:40.399133 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.399223 kubelet[1947]: E0517 00:33:40.399141 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.399265 kubelet[1947]: E0517 00:33:40.399250 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.399265 kubelet[1947]: W0517 00:33:40.399257 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.399265 kubelet[1947]: E0517 00:33:40.399264 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.399395 kubelet[1947]: E0517 00:33:40.399379 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.399395 kubelet[1947]: W0517 00:33:40.399389 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.399395 kubelet[1947]: E0517 00:33:40.399396 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.399510 kubelet[1947]: E0517 00:33:40.399497 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.399510 kubelet[1947]: W0517 00:33:40.399507 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.399557 kubelet[1947]: E0517 00:33:40.399514 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.400177 kubelet[1947]: E0517 00:33:40.399618 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.400177 kubelet[1947]: W0517 00:33:40.399628 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.400177 kubelet[1947]: E0517 00:33:40.399635 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.400177 kubelet[1947]: E0517 00:33:40.399832 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.400177 kubelet[1947]: W0517 00:33:40.399839 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.400177 kubelet[1947]: E0517 00:33:40.399846 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.400177 kubelet[1947]: E0517 00:33:40.400095 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.400177 kubelet[1947]: W0517 00:33:40.400102 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.400177 kubelet[1947]: E0517 00:33:40.400109 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.400429 kubelet[1947]: E0517 00:33:40.400221 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.400429 kubelet[1947]: W0517 00:33:40.400227 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.400429 kubelet[1947]: E0517 00:33:40.400235 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.400429 kubelet[1947]: E0517 00:33:40.400369 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.400429 kubelet[1947]: W0517 00:33:40.400375 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.400429 kubelet[1947]: E0517 00:33:40.400382 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.400723 kubelet[1947]: E0517 00:33:40.400641 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.400723 kubelet[1947]: W0517 00:33:40.400663 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.400723 kubelet[1947]: E0517 00:33:40.400689 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.400896 kubelet[1947]: E0517 00:33:40.400859 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.400896 kubelet[1947]: W0517 00:33:40.400876 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.400896 kubelet[1947]: E0517 00:33:40.400883 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.401015 kubelet[1947]: E0517 00:33:40.400998 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.401015 kubelet[1947]: W0517 00:33:40.401005 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.401015 kubelet[1947]: E0517 00:33:40.401013 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.401174 kubelet[1947]: E0517 00:33:40.401158 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.401174 kubelet[1947]: W0517 00:33:40.401168 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.401174 kubelet[1947]: E0517 00:33:40.401175 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.404653 kubelet[1947]: E0517 00:33:40.404619 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.404653 kubelet[1947]: W0517 00:33:40.404649 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.404753 kubelet[1947]: E0517 00:33:40.404666 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.404753 kubelet[1947]: I0517 00:33:40.404694 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9d2n5\" (UniqueName: \"kubernetes.io/projected/b65ec255-9954-44f6-8517-cb2caadf1655-kube-api-access-9d2n5\") pod \"csi-node-driver-vkxng\" (UID: \"b65ec255-9954-44f6-8517-cb2caadf1655\") " pod="calico-system/csi-node-driver-vkxng" May 17 00:33:40.404942 kubelet[1947]: E0517 00:33:40.404920 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.404942 kubelet[1947]: W0517 00:33:40.404937 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.405011 kubelet[1947]: E0517 00:33:40.404957 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.405011 kubelet[1947]: I0517 00:33:40.404991 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b65ec255-9954-44f6-8517-cb2caadf1655-registration-dir\") pod \"csi-node-driver-vkxng\" (UID: \"b65ec255-9954-44f6-8517-cb2caadf1655\") " pod="calico-system/csi-node-driver-vkxng" May 17 00:33:40.405241 kubelet[1947]: E0517 00:33:40.405206 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.405241 kubelet[1947]: W0517 00:33:40.405218 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.405241 kubelet[1947]: E0517 00:33:40.405232 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.405241 kubelet[1947]: I0517 00:33:40.405244 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b65ec255-9954-44f6-8517-cb2caadf1655-socket-dir\") pod \"csi-node-driver-vkxng\" (UID: \"b65ec255-9954-44f6-8517-cb2caadf1655\") " pod="calico-system/csi-node-driver-vkxng" May 17 00:33:40.405442 kubelet[1947]: E0517 00:33:40.405425 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.405442 kubelet[1947]: W0517 00:33:40.405439 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.405494 kubelet[1947]: E0517 00:33:40.405454 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.405684 kubelet[1947]: E0517 00:33:40.405652 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.405684 kubelet[1947]: W0517 00:33:40.405665 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.405684 kubelet[1947]: E0517 00:33:40.405681 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.405901 kubelet[1947]: E0517 00:33:40.405885 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.405901 kubelet[1947]: W0517 00:33:40.405897 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.405986 kubelet[1947]: E0517 00:33:40.405912 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.406154 kubelet[1947]: E0517 00:33:40.406133 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.406154 kubelet[1947]: W0517 00:33:40.406149 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.406267 kubelet[1947]: E0517 00:33:40.406167 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.406404 kubelet[1947]: E0517 00:33:40.406389 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.406404 kubelet[1947]: W0517 00:33:40.406400 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.406474 kubelet[1947]: E0517 00:33:40.406414 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.406474 kubelet[1947]: I0517 00:33:40.406439 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b65ec255-9954-44f6-8517-cb2caadf1655-varrun\") pod \"csi-node-driver-vkxng\" (UID: \"b65ec255-9954-44f6-8517-cb2caadf1655\") " pod="calico-system/csi-node-driver-vkxng" May 17 00:33:40.406659 kubelet[1947]: E0517 00:33:40.406638 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.406659 kubelet[1947]: W0517 00:33:40.406655 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.406757 kubelet[1947]: E0517 00:33:40.406683 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.406757 kubelet[1947]: I0517 00:33:40.406706 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b65ec255-9954-44f6-8517-cb2caadf1655-kubelet-dir\") pod \"csi-node-driver-vkxng\" (UID: \"b65ec255-9954-44f6-8517-cb2caadf1655\") " pod="calico-system/csi-node-driver-vkxng" May 17 00:33:40.406864 kubelet[1947]: E0517 00:33:40.406851 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.406864 kubelet[1947]: W0517 00:33:40.406861 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.406909 kubelet[1947]: E0517 00:33:40.406883 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.407020 kubelet[1947]: E0517 00:33:40.407007 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.407020 kubelet[1947]: W0517 00:33:40.407017 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.407020 kubelet[1947]: E0517 00:33:40.407049 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.407260 kubelet[1947]: E0517 00:33:40.407233 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.407260 kubelet[1947]: W0517 00:33:40.407247 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.407260 kubelet[1947]: E0517 00:33:40.407264 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.407520 kubelet[1947]: E0517 00:33:40.407406 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.407520 kubelet[1947]: W0517 00:33:40.407413 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.407520 kubelet[1947]: E0517 00:33:40.407420 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.407631 kubelet[1947]: E0517 00:33:40.407530 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.407631 kubelet[1947]: W0517 00:33:40.407538 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.407631 kubelet[1947]: E0517 00:33:40.407545 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.407708 kubelet[1947]: E0517 00:33:40.407682 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.407708 kubelet[1947]: W0517 00:33:40.407689 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.407758 kubelet[1947]: E0517 00:33:40.407695 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.440990 env[1200]: time="2025-05-17T00:33:40.440943616Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q5wvd,Uid:310b6d3f-688f-49a6-9795-7d60c9c81c7c,Namespace:calico-system,Attempt:0,}" May 17 00:33:40.460579 env[1200]: time="2025-05-17T00:33:40.460490339Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:33:40.460579 env[1200]: time="2025-05-17T00:33:40.460528942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:33:40.460579 env[1200]: time="2025-05-17T00:33:40.460543960Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:33:40.460800 env[1200]: time="2025-05-17T00:33:40.460696138Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415 pid=2510 runtime=io.containerd.runc.v2 May 17 00:33:40.470554 systemd[1]: Started cri-containerd-bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415.scope. May 17 00:33:40.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit: BPF prog-id=129 op=LOAD May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262306137663934383834363562643663643965363431613263613537 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262306137663934383834363562643663643965363431613263613537 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit: BPF prog-id=130 op=LOAD May 17 00:33:40.480000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000326ad0 items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262306137663934383834363562643663643965363431613263613537 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.480000 audit: BPF prog-id=131 op=LOAD May 17 00:33:40.480000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000326b18 items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.480000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262306137663934383834363562643663643965363431613263613537 May 17 00:33:40.481000 audit: BPF prog-id=131 op=UNLOAD May 17 00:33:40.481000 audit: BPF prog-id=130 op=UNLOAD May 17 00:33:40.481000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:40.481000 audit: BPF prog-id=132 op=LOAD May 17 00:33:40.481000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000326f28 items=0 ppid=2510 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.481000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262306137663934383834363562643663643965363431613263613537 May 17 00:33:40.490970 env[1200]: time="2025-05-17T00:33:40.490258540Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-q5wvd,Uid:310b6d3f-688f-49a6-9795-7d60c9c81c7c,Namespace:calico-system,Attempt:0,} returns sandbox id \"bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415\"" May 17 00:33:40.507500 kubelet[1947]: E0517 00:33:40.507463 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.507500 kubelet[1947]: W0517 00:33:40.507489 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.507615 kubelet[1947]: E0517 00:33:40.507512 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.507746 kubelet[1947]: E0517 00:33:40.507731 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.507746 kubelet[1947]: W0517 00:33:40.507741 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.507819 kubelet[1947]: E0517 00:33:40.507755 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.508020 kubelet[1947]: E0517 00:33:40.507990 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.508020 kubelet[1947]: W0517 00:33:40.508011 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.508095 kubelet[1947]: E0517 00:33:40.508061 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.508252 kubelet[1947]: E0517 00:33:40.508238 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.508252 kubelet[1947]: W0517 00:33:40.508248 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.508303 kubelet[1947]: E0517 00:33:40.508260 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.508477 kubelet[1947]: E0517 00:33:40.508462 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.508477 kubelet[1947]: W0517 00:33:40.508475 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.508522 kubelet[1947]: E0517 00:33:40.508492 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.509054 kubelet[1947]: E0517 00:33:40.509036 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.509054 kubelet[1947]: W0517 00:33:40.509050 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.509144 kubelet[1947]: E0517 00:33:40.509063 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.509277 kubelet[1947]: E0517 00:33:40.509254 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.509277 kubelet[1947]: W0517 00:33:40.509267 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.509324 kubelet[1947]: E0517 00:33:40.509280 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.509484 kubelet[1947]: E0517 00:33:40.509465 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.509484 kubelet[1947]: W0517 00:33:40.509475 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.509539 kubelet[1947]: E0517 00:33:40.509519 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.509624 kubelet[1947]: E0517 00:33:40.509611 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.509624 kubelet[1947]: W0517 00:33:40.509621 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.509708 kubelet[1947]: E0517 00:33:40.509694 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.509752 kubelet[1947]: E0517 00:33:40.509741 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.509752 kubelet[1947]: W0517 00:33:40.509750 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.509798 kubelet[1947]: E0517 00:33:40.509759 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.509931 kubelet[1947]: E0517 00:33:40.509910 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.509931 kubelet[1947]: W0517 00:33:40.509922 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.509931 kubelet[1947]: E0517 00:33:40.509931 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.510110 kubelet[1947]: E0517 00:33:40.510098 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.510110 kubelet[1947]: W0517 00:33:40.510108 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.510159 kubelet[1947]: E0517 00:33:40.510118 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.510274 kubelet[1947]: E0517 00:33:40.510262 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.510274 kubelet[1947]: W0517 00:33:40.510272 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.510320 kubelet[1947]: E0517 00:33:40.510280 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.510408 kubelet[1947]: E0517 00:33:40.510396 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.510408 kubelet[1947]: W0517 00:33:40.510407 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.510455 kubelet[1947]: E0517 00:33:40.510417 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.510585 kubelet[1947]: E0517 00:33:40.510573 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.510585 kubelet[1947]: W0517 00:33:40.510584 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.510631 kubelet[1947]: E0517 00:33:40.510595 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.510754 kubelet[1947]: E0517 00:33:40.510742 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.510754 kubelet[1947]: W0517 00:33:40.510751 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.510816 kubelet[1947]: E0517 00:33:40.510793 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.510898 kubelet[1947]: E0517 00:33:40.510886 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.510898 kubelet[1947]: W0517 00:33:40.510896 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.510944 kubelet[1947]: E0517 00:33:40.510917 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.511108 kubelet[1947]: E0517 00:33:40.511094 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.511135 kubelet[1947]: W0517 00:33:40.511107 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.511135 kubelet[1947]: E0517 00:33:40.511131 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.511264 kubelet[1947]: E0517 00:33:40.511252 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.511264 kubelet[1947]: W0517 00:33:40.511263 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.511314 kubelet[1947]: E0517 00:33:40.511275 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.511437 kubelet[1947]: E0517 00:33:40.511425 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.511437 kubelet[1947]: W0517 00:33:40.511435 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.511484 kubelet[1947]: E0517 00:33:40.511447 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.511611 kubelet[1947]: E0517 00:33:40.511599 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.511611 kubelet[1947]: W0517 00:33:40.511609 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.511655 kubelet[1947]: E0517 00:33:40.511620 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.511839 kubelet[1947]: E0517 00:33:40.511816 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.511839 kubelet[1947]: W0517 00:33:40.511833 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.511910 kubelet[1947]: E0517 00:33:40.511846 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.512111 kubelet[1947]: E0517 00:33:40.512095 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.512111 kubelet[1947]: W0517 00:33:40.512106 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.512177 kubelet[1947]: E0517 00:33:40.512116 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.512358 kubelet[1947]: E0517 00:33:40.512345 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.512358 kubelet[1947]: W0517 00:33:40.512354 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.512413 kubelet[1947]: E0517 00:33:40.512365 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.512748 kubelet[1947]: E0517 00:33:40.512727 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.512926 kubelet[1947]: W0517 00:33:40.512911 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.513000 kubelet[1947]: E0517 00:33:40.512986 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.519163 kubelet[1947]: E0517 00:33:40.519143 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:40.519163 kubelet[1947]: W0517 00:33:40.519161 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:40.519252 kubelet[1947]: E0517 00:33:40.519184 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:40.889000 audit[2571]: NETFILTER_CFG table=filter:97 family=2 entries=22 op=nft_register_rule pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:40.889000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffc57b20800 a2=0 a3=7ffc57b207ec items=0 ppid=2053 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.889000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:40.894000 audit[2571]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2571 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:33:40.894000 audit[2571]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc57b20800 a2=0 a3=0 items=0 ppid=2053 pid=2571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:40.894000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:33:41.836615 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1501250239.mount: Deactivated successfully. May 17 00:33:41.921892 kubelet[1947]: E0517 00:33:41.921800 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:42.592138 env[1200]: time="2025-05-17T00:33:42.592063889Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:42.594116 env[1200]: time="2025-05-17T00:33:42.594083422Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:42.595545 env[1200]: time="2025-05-17T00:33:42.595515516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:42.596906 env[1200]: time="2025-05-17T00:33:42.596843164Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:d282f6c773c4631b9dc8379eb093c54ca34c7728d55d6509cb45da5e1f5baf8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:42.597264 env[1200]: time="2025-05-17T00:33:42.597216729Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.30.0\" returns image reference \"sha256:71be0570e8645ac646675719e0da6ac33a05810991b31aecc303e7add70933be\"" May 17 00:33:42.598240 env[1200]: time="2025-05-17T00:33:42.598216657Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\"" May 17 00:33:42.608102 env[1200]: time="2025-05-17T00:33:42.608046649Z" level=info msg="CreateContainer within sandbox \"999875fb7d93d5e31f29a40ae014a7fc7256a9f4076da02fc42692cc12c1a83e\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 17 00:33:42.621405 env[1200]: time="2025-05-17T00:33:42.621355701Z" level=info msg="CreateContainer within sandbox \"999875fb7d93d5e31f29a40ae014a7fc7256a9f4076da02fc42692cc12c1a83e\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"76b3b777daa7cf05ac69e4eaaaae194c09bfba4dcd1d7da17124f41a0687a89d\"" May 17 00:33:42.622761 env[1200]: time="2025-05-17T00:33:42.622714126Z" level=info msg="StartContainer for \"76b3b777daa7cf05ac69e4eaaaae194c09bfba4dcd1d7da17124f41a0687a89d\"" May 17 00:33:42.638458 systemd[1]: Started cri-containerd-76b3b777daa7cf05ac69e4eaaaae194c09bfba4dcd1d7da17124f41a0687a89d.scope. May 17 00:33:42.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit: BPF prog-id=133 op=LOAD May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2431 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:42.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623362373737646161376366303561633639653465616161616531 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2431 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:42.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623362373737646161376366303561633639653465616161616531 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit: BPF prog-id=134 op=LOAD May 17 00:33:42.650000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098d80 items=0 ppid=2431 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:42.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623362373737646161376366303561633639653465616161616531 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit: BPF prog-id=135 op=LOAD May 17 00:33:42.650000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098dc8 items=0 ppid=2431 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:42.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623362373737646161376366303561633639653465616161616531 May 17 00:33:42.650000 audit: BPF prog-id=135 op=UNLOAD May 17 00:33:42.650000 audit: BPF prog-id=134 op=UNLOAD May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { perfmon } for pid=2582 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit[2582]: AVC avc: denied { bpf } for pid=2582 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:42.650000 audit: BPF prog-id=136 op=LOAD May 17 00:33:42.650000 audit[2582]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000991d8 items=0 ppid=2431 pid=2582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:42.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736623362373737646161376366303561633639653465616161616531 May 17 00:33:42.677058 env[1200]: time="2025-05-17T00:33:42.676984135Z" level=info msg="StartContainer for \"76b3b777daa7cf05ac69e4eaaaae194c09bfba4dcd1d7da17124f41a0687a89d\" returns successfully" May 17 00:33:42.945917 kubelet[1947]: E0517 00:33:42.945778 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:42.972221 kubelet[1947]: I0517 00:33:42.972150 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-55b9c49599-7tw4k" podStartSLOduration=1.628870217 podStartE2EDuration="3.97212824s" podCreationTimestamp="2025-05-17 00:33:39 +0000 UTC" firstStartedPulling="2025-05-17 00:33:40.254780317 +0000 UTC m=+17.430133798" lastFinishedPulling="2025-05-17 00:33:42.59803833 +0000 UTC m=+19.773391821" observedRunningTime="2025-05-17 00:33:42.971808335 +0000 UTC m=+20.147161826" watchObservedRunningTime="2025-05-17 00:33:42.97212824 +0000 UTC m=+20.147481731" May 17 00:33:43.024240 kubelet[1947]: E0517 00:33:43.024197 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.024240 kubelet[1947]: W0517 00:33:43.024223 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.024240 kubelet[1947]: E0517 00:33:43.024246 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.024533 kubelet[1947]: E0517 00:33:43.024431 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.024533 kubelet[1947]: W0517 00:33:43.024438 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.024533 kubelet[1947]: E0517 00:33:43.024445 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.024605 kubelet[1947]: E0517 00:33:43.024551 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.024605 kubelet[1947]: W0517 00:33:43.024557 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.024605 kubelet[1947]: E0517 00:33:43.024564 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.024676 kubelet[1947]: E0517 00:33:43.024670 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.024704 kubelet[1947]: W0517 00:33:43.024677 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.024704 kubelet[1947]: E0517 00:33:43.024684 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.024799 kubelet[1947]: E0517 00:33:43.024786 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.024799 kubelet[1947]: W0517 00:33:43.024795 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.024848 kubelet[1947]: E0517 00:33:43.024801 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.024909 kubelet[1947]: E0517 00:33:43.024898 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.024909 kubelet[1947]: W0517 00:33:43.024906 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.024958 kubelet[1947]: E0517 00:33:43.024913 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025015 kubelet[1947]: E0517 00:33:43.025005 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025015 kubelet[1947]: W0517 00:33:43.025013 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025091 kubelet[1947]: E0517 00:33:43.025020 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025152 kubelet[1947]: E0517 00:33:43.025141 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025152 kubelet[1947]: W0517 00:33:43.025150 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025205 kubelet[1947]: E0517 00:33:43.025158 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025270 kubelet[1947]: E0517 00:33:43.025260 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025270 kubelet[1947]: W0517 00:33:43.025268 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025326 kubelet[1947]: E0517 00:33:43.025274 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025394 kubelet[1947]: E0517 00:33:43.025381 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025428 kubelet[1947]: W0517 00:33:43.025394 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025428 kubelet[1947]: E0517 00:33:43.025403 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025515 kubelet[1947]: E0517 00:33:43.025502 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025515 kubelet[1947]: W0517 00:33:43.025511 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025565 kubelet[1947]: E0517 00:33:43.025519 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025634 kubelet[1947]: E0517 00:33:43.025624 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025634 kubelet[1947]: W0517 00:33:43.025632 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025680 kubelet[1947]: E0517 00:33:43.025639 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025753 kubelet[1947]: E0517 00:33:43.025742 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025753 kubelet[1947]: W0517 00:33:43.025751 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025800 kubelet[1947]: E0517 00:33:43.025757 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.025868 kubelet[1947]: E0517 00:33:43.025857 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.025868 kubelet[1947]: W0517 00:33:43.025866 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.025916 kubelet[1947]: E0517 00:33:43.025872 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.026022 kubelet[1947]: E0517 00:33:43.026007 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.026022 kubelet[1947]: W0517 00:33:43.026016 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.026022 kubelet[1947]: E0517 00:33:43.026022 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.029295 kubelet[1947]: E0517 00:33:43.029278 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.029295 kubelet[1947]: W0517 00:33:43.029291 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.029365 kubelet[1947]: E0517 00:33:43.029301 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.029487 kubelet[1947]: E0517 00:33:43.029470 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.029487 kubelet[1947]: W0517 00:33:43.029483 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.029558 kubelet[1947]: E0517 00:33:43.029497 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.029635 kubelet[1947]: E0517 00:33:43.029620 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.029635 kubelet[1947]: W0517 00:33:43.029630 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.029707 kubelet[1947]: E0517 00:33:43.029639 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.029782 kubelet[1947]: E0517 00:33:43.029767 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.029782 kubelet[1947]: W0517 00:33:43.029776 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.029854 kubelet[1947]: E0517 00:33:43.029785 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.029910 kubelet[1947]: E0517 00:33:43.029897 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.029910 kubelet[1947]: W0517 00:33:43.029906 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.029962 kubelet[1947]: E0517 00:33:43.029916 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.030074 kubelet[1947]: E0517 00:33:43.030012 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.030074 kubelet[1947]: W0517 00:33:43.030021 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.030074 kubelet[1947]: E0517 00:33:43.030043 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.030204 kubelet[1947]: E0517 00:33:43.030191 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.030204 kubelet[1947]: W0517 00:33:43.030200 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.030256 kubelet[1947]: E0517 00:33:43.030210 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.030401 kubelet[1947]: E0517 00:33:43.030386 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.030401 kubelet[1947]: W0517 00:33:43.030397 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.030476 kubelet[1947]: E0517 00:33:43.030410 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.030528 kubelet[1947]: E0517 00:33:43.030514 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.030528 kubelet[1947]: W0517 00:33:43.030523 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.030578 kubelet[1947]: E0517 00:33:43.030533 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.030647 kubelet[1947]: E0517 00:33:43.030634 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.030647 kubelet[1947]: W0517 00:33:43.030644 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.030697 kubelet[1947]: E0517 00:33:43.030654 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.030797 kubelet[1947]: E0517 00:33:43.030776 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.030797 kubelet[1947]: W0517 00:33:43.030788 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.030844 kubelet[1947]: E0517 00:33:43.030806 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.030895 kubelet[1947]: E0517 00:33:43.030884 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.030895 kubelet[1947]: W0517 00:33:43.030893 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.030946 kubelet[1947]: E0517 00:33:43.030912 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.031015 kubelet[1947]: E0517 00:33:43.031004 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.031015 kubelet[1947]: W0517 00:33:43.031013 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.031106 kubelet[1947]: E0517 00:33:43.031034 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.031179 kubelet[1947]: E0517 00:33:43.031167 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.031179 kubelet[1947]: W0517 00:33:43.031177 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.031228 kubelet[1947]: E0517 00:33:43.031186 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.031308 kubelet[1947]: E0517 00:33:43.031297 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.031308 kubelet[1947]: W0517 00:33:43.031306 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.031354 kubelet[1947]: E0517 00:33:43.031313 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.031426 kubelet[1947]: E0517 00:33:43.031414 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.031426 kubelet[1947]: W0517 00:33:43.031424 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.031476 kubelet[1947]: E0517 00:33:43.031430 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.031556 kubelet[1947]: E0517 00:33:43.031541 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.031556 kubelet[1947]: W0517 00:33:43.031550 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.031556 kubelet[1947]: E0517 00:33:43.031556 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.031896 kubelet[1947]: E0517 00:33:43.031873 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:43.031896 kubelet[1947]: W0517 00:33:43.031884 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:43.031896 kubelet[1947]: E0517 00:33:43.031891 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:43.896695 kubelet[1947]: E0517 00:33:43.896637 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:43.946727 kubelet[1947]: I0517 00:33:43.946686 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:33:43.947145 kubelet[1947]: E0517 00:33:43.947126 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:44.033927 kubelet[1947]: E0517 00:33:44.033874 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.033927 kubelet[1947]: W0517 00:33:44.033907 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.033927 kubelet[1947]: E0517 00:33:44.033935 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.034223 kubelet[1947]: E0517 00:33:44.034180 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.034223 kubelet[1947]: W0517 00:33:44.034206 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.034429 kubelet[1947]: E0517 00:33:44.034235 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.034510 kubelet[1947]: E0517 00:33:44.034444 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.034510 kubelet[1947]: W0517 00:33:44.034458 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.034510 kubelet[1947]: E0517 00:33:44.034470 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.034643 kubelet[1947]: E0517 00:33:44.034628 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.034643 kubelet[1947]: W0517 00:33:44.034641 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.034710 kubelet[1947]: E0517 00:33:44.034648 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.034818 kubelet[1947]: E0517 00:33:44.034796 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.034818 kubelet[1947]: W0517 00:33:44.034807 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.034818 kubelet[1947]: E0517 00:33:44.034814 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.034947 kubelet[1947]: E0517 00:33:44.034935 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.034947 kubelet[1947]: W0517 00:33:44.034943 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.035008 kubelet[1947]: E0517 00:33:44.034949 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.035109 kubelet[1947]: E0517 00:33:44.035096 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.035109 kubelet[1947]: W0517 00:33:44.035105 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.035178 kubelet[1947]: E0517 00:33:44.035113 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.035246 kubelet[1947]: E0517 00:33:44.035233 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.035246 kubelet[1947]: W0517 00:33:44.035242 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.035313 kubelet[1947]: E0517 00:33:44.035249 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.035387 kubelet[1947]: E0517 00:33:44.035375 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.035387 kubelet[1947]: W0517 00:33:44.035385 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.035451 kubelet[1947]: E0517 00:33:44.035392 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.035595 kubelet[1947]: E0517 00:33:44.035573 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.035595 kubelet[1947]: W0517 00:33:44.035584 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.035595 kubelet[1947]: E0517 00:33:44.035592 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.035733 kubelet[1947]: E0517 00:33:44.035719 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.035733 kubelet[1947]: W0517 00:33:44.035727 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.035733 kubelet[1947]: E0517 00:33:44.035734 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.035869 kubelet[1947]: E0517 00:33:44.035856 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.035869 kubelet[1947]: W0517 00:33:44.035865 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.035938 kubelet[1947]: E0517 00:33:44.035873 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.036013 kubelet[1947]: E0517 00:33:44.036000 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.036013 kubelet[1947]: W0517 00:33:44.036008 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.036103 kubelet[1947]: E0517 00:33:44.036015 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.036177 kubelet[1947]: E0517 00:33:44.036164 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.036177 kubelet[1947]: W0517 00:33:44.036174 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.036239 kubelet[1947]: E0517 00:33:44.036181 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.036320 kubelet[1947]: E0517 00:33:44.036307 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.036320 kubelet[1947]: W0517 00:33:44.036318 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.036380 kubelet[1947]: E0517 00:33:44.036325 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.037731 kubelet[1947]: E0517 00:33:44.037708 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.037731 kubelet[1947]: W0517 00:33:44.037720 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.037731 kubelet[1947]: E0517 00:33:44.037731 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.037925 kubelet[1947]: E0517 00:33:44.037906 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.037925 kubelet[1947]: W0517 00:33:44.037915 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.037925 kubelet[1947]: E0517 00:33:44.037927 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.038209 kubelet[1947]: E0517 00:33:44.038151 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.038209 kubelet[1947]: W0517 00:33:44.038157 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.038209 kubelet[1947]: E0517 00:33:44.038169 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.038353 kubelet[1947]: E0517 00:33:44.038319 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.038353 kubelet[1947]: W0517 00:33:44.038326 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.038353 kubelet[1947]: E0517 00:33:44.038338 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.038492 kubelet[1947]: E0517 00:33:44.038475 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.038492 kubelet[1947]: W0517 00:33:44.038483 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.038554 kubelet[1947]: E0517 00:33:44.038494 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.038641 kubelet[1947]: E0517 00:33:44.038625 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.038641 kubelet[1947]: W0517 00:33:44.038634 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.038703 kubelet[1947]: E0517 00:33:44.038644 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.038842 kubelet[1947]: E0517 00:33:44.038826 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.038842 kubelet[1947]: W0517 00:33:44.038835 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.038905 kubelet[1947]: E0517 00:33:44.038847 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.038998 kubelet[1947]: E0517 00:33:44.038981 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.038998 kubelet[1947]: W0517 00:33:44.038995 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.039098 kubelet[1947]: E0517 00:33:44.039008 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.039186 kubelet[1947]: E0517 00:33:44.039175 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.039226 kubelet[1947]: W0517 00:33:44.039185 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.039226 kubelet[1947]: E0517 00:33:44.039206 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.039328 kubelet[1947]: E0517 00:33:44.039319 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.039328 kubelet[1947]: W0517 00:33:44.039326 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.039384 kubelet[1947]: E0517 00:33:44.039346 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.039459 kubelet[1947]: E0517 00:33:44.039449 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.039459 kubelet[1947]: W0517 00:33:44.039456 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.039520 kubelet[1947]: E0517 00:33:44.039467 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.039609 kubelet[1947]: E0517 00:33:44.039599 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.039609 kubelet[1947]: W0517 00:33:44.039607 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.039667 kubelet[1947]: E0517 00:33:44.039618 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.039761 kubelet[1947]: E0517 00:33:44.039746 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.039761 kubelet[1947]: W0517 00:33:44.039759 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.039827 kubelet[1947]: E0517 00:33:44.039775 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.039887 kubelet[1947]: E0517 00:33:44.039874 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.039887 kubelet[1947]: W0517 00:33:44.039883 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.039954 kubelet[1947]: E0517 00:33:44.039893 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.040057 kubelet[1947]: E0517 00:33:44.040044 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.040057 kubelet[1947]: W0517 00:33:44.040053 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.040128 kubelet[1947]: E0517 00:33:44.040065 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.040233 kubelet[1947]: E0517 00:33:44.040222 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.040233 kubelet[1947]: W0517 00:33:44.040232 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.040303 kubelet[1947]: E0517 00:33:44.040239 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.040436 kubelet[1947]: E0517 00:33:44.040421 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.040436 kubelet[1947]: W0517 00:33:44.040431 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.040506 kubelet[1947]: E0517 00:33:44.040445 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.040566 kubelet[1947]: E0517 00:33:44.040552 1947 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 17 00:33:44.040566 kubelet[1947]: W0517 00:33:44.040562 1947 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 17 00:33:44.040628 kubelet[1947]: E0517 00:33:44.040569 1947 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 17 00:33:44.229113 env[1200]: time="2025-05-17T00:33:44.228995139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:44.231325 env[1200]: time="2025-05-17T00:33:44.231288136Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:44.232903 env[1200]: time="2025-05-17T00:33:44.232872795Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:44.234371 env[1200]: time="2025-05-17T00:33:44.234339884Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:ce76dd87f11d3fd0054c35ad2e0e9f833748d007f77a9bfe859d0ddcb66fcb2c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:44.234859 env[1200]: time="2025-05-17T00:33:44.234828616Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.30.0\" returns image reference \"sha256:c53606cea03e59dcbfa981dc43a55dff05952895f72576b8389fa00be09ab676\"" May 17 00:33:44.237070 env[1200]: time="2025-05-17T00:33:44.237022205Z" level=info msg="CreateContainer within sandbox \"bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 17 00:33:44.250518 env[1200]: time="2025-05-17T00:33:44.250474148Z" level=info msg="CreateContainer within sandbox \"bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee\"" May 17 00:33:44.251126 env[1200]: time="2025-05-17T00:33:44.251105378Z" level=info msg="StartContainer for \"5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee\"" May 17 00:33:44.271847 systemd[1]: Started cri-containerd-5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee.scope. May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f4d881f94f8 items=0 ppid=2510 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:44.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366230373666386265306164396237363534336534323562376261 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit: BPF prog-id=137 op=LOAD May 17 00:33:44.282000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001f8cc8 items=0 ppid=2510 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:44.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366230373666386265306164396237363534336534323562376261 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.282000 audit: BPF prog-id=138 op=LOAD May 17 00:33:44.282000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001f8d18 items=0 ppid=2510 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:44.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366230373666386265306164396237363534336534323562376261 May 17 00:33:44.282000 audit: BPF prog-id=138 op=UNLOAD May 17 00:33:44.283000 audit: BPF prog-id=137 op=UNLOAD May 17 00:33:44.283000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { perfmon } for pid=2688 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit[2688]: AVC avc: denied { bpf } for pid=2688 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:44.283000 audit: BPF prog-id=139 op=LOAD May 17 00:33:44.283000 audit[2688]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001f8da8 items=0 ppid=2510 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:44.283000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366230373666386265306164396237363534336534323562376261 May 17 00:33:44.303588 systemd[1]: cri-containerd-5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee.scope: Deactivated successfully. May 17 00:33:44.308000 audit: BPF prog-id=139 op=UNLOAD May 17 00:33:44.502214 env[1200]: time="2025-05-17T00:33:44.501269327Z" level=info msg="StartContainer for \"5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee\" returns successfully" May 17 00:33:44.569099 env[1200]: time="2025-05-17T00:33:44.569057164Z" level=info msg="shim disconnected" id=5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee May 17 00:33:44.569313 env[1200]: time="2025-05-17T00:33:44.569280506Z" level=warning msg="cleaning up after shim disconnected" id=5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee namespace=k8s.io May 17 00:33:44.569313 env[1200]: time="2025-05-17T00:33:44.569299631Z" level=info msg="cleaning up dead shim" May 17 00:33:44.574721 env[1200]: time="2025-05-17T00:33:44.574695372Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:33:44Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2729 runtime=io.containerd.runc.v2\n" May 17 00:33:44.602324 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5e6b076f8be0ad9b76543e425b7ba33614087937460c67dfec173e55b1c2f8ee-rootfs.mount: Deactivated successfully. May 17 00:33:44.950418 env[1200]: time="2025-05-17T00:33:44.950383600Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\"" May 17 00:33:45.896334 kubelet[1947]: E0517 00:33:45.896272 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:47.896057 kubelet[1947]: E0517 00:33:47.895996 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:49.125344 env[1200]: time="2025-05-17T00:33:49.125273165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:49.127586 env[1200]: time="2025-05-17T00:33:49.127520779Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:49.130663 env[1200]: time="2025-05-17T00:33:49.130602304Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:49.132690 env[1200]: time="2025-05-17T00:33:49.132621830Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:3dd06656abdc03fbd51782d5f6fe4d70e6825a1c0c5bce2a165bbd2ff9e0f7df,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:49.133043 env[1200]: time="2025-05-17T00:33:49.132988249Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.30.0\" returns image reference \"sha256:15f996c472622f23047ea38b2d72940e8c34d0996b8a2e12a1f255c1d7083185\"" May 17 00:33:49.135122 env[1200]: time="2025-05-17T00:33:49.135089228Z" level=info msg="CreateContainer within sandbox \"bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 17 00:33:49.153247 env[1200]: time="2025-05-17T00:33:49.153198306Z" level=info msg="CreateContainer within sandbox \"bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c\"" May 17 00:33:49.153874 env[1200]: time="2025-05-17T00:33:49.153811050Z" level=info msg="StartContainer for \"3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c\"" May 17 00:33:49.173937 systemd[1]: Started cri-containerd-3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c.scope. May 17 00:33:49.188000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.190389 kernel: kauditd_printk_skb: 223 callbacks suppressed May 17 00:33:49.190463 kernel: audit: type=1400 audit(1747442029.188:1020): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f677c288cc8 items=0 ppid=2510 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:49.199710 kernel: audit: type=1300 audit(1747442029.188:1020): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f677c288cc8 items=0 ppid=2510 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:49.199831 kernel: audit: type=1327 audit(1747442029.188:1020): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306665626638356163323037333438363263623235653032663839 May 17 00:33:49.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306665626638356163323037333438363263623235653032663839 May 17 00:33:49.204371 kernel: audit: type=1400 audit(1747442029.188:1021): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.215281 kernel: audit: type=1400 audit(1747442029.188:1021): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.215346 kernel: audit: type=1400 audit(1747442029.188:1021): avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.215364 kernel: audit: type=1400 audit(1747442029.188:1021): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.219838 kernel: audit: type=1400 audit(1747442029.188:1021): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.226835 kernel: audit: type=1400 audit(1747442029.188:1021): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit: BPF prog-id=140 op=LOAD May 17 00:33:49.188000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002fbc58 items=0 ppid=2510 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:49.231139 kernel: audit: type=1400 audit(1747442029.188:1021): avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306665626638356163323037333438363263623235653032663839 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.192000 audit: BPF prog-id=141 op=LOAD May 17 00:33:49.192000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002fbca8 items=0 ppid=2510 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:49.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306665626638356163323037333438363263623235653032663839 May 17 00:33:49.203000 audit: BPF prog-id=141 op=UNLOAD May 17 00:33:49.203000 audit: BPF prog-id=140 op=UNLOAD May 17 00:33:49.203000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { perfmon } for pid=2753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit[2753]: AVC avc: denied { bpf } for pid=2753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:49.203000 audit: BPF prog-id=142 op=LOAD May 17 00:33:49.203000 audit[2753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002fbd38 items=0 ppid=2510 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:49.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365306665626638356163323037333438363263623235653032663839 May 17 00:33:49.363725 env[1200]: time="2025-05-17T00:33:49.363653622Z" level=info msg="StartContainer for \"3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c\" returns successfully" May 17 00:33:49.895728 kubelet[1947]: E0517 00:33:49.895654 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:50.145511 systemd[1]: run-containerd-runc-k8s.io-3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c-runc.ZziRGe.mount: Deactivated successfully. May 17 00:33:50.838271 env[1200]: time="2025-05-17T00:33:50.838217937Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 17 00:33:50.840075 systemd[1]: cri-containerd-3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c.scope: Deactivated successfully. May 17 00:33:50.843000 audit: BPF prog-id=142 op=UNLOAD May 17 00:33:50.856698 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c-rootfs.mount: Deactivated successfully. May 17 00:33:50.862376 env[1200]: time="2025-05-17T00:33:50.862319092Z" level=info msg="shim disconnected" id=3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c May 17 00:33:50.862376 env[1200]: time="2025-05-17T00:33:50.862366872Z" level=warning msg="cleaning up after shim disconnected" id=3e0febf85ac20734862cb25e02f895cf19f1e2ff9c1b6bb9a019244a0d36365c namespace=k8s.io May 17 00:33:50.862376 env[1200]: time="2025-05-17T00:33:50.862376009Z" level=info msg="cleaning up dead shim" May 17 00:33:50.869381 env[1200]: time="2025-05-17T00:33:50.869330378Z" level=warning msg="cleanup warnings time=\"2025-05-17T00:33:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2793 runtime=io.containerd.runc.v2\n" May 17 00:33:50.901149 kubelet[1947]: I0517 00:33:50.901117 1947 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 17 00:33:50.930844 systemd[1]: Created slice kubepods-burstable-pod6460ee60_efd6_4594_b67c_0eef44ca4cb2.slice. May 17 00:33:50.938097 systemd[1]: Created slice kubepods-besteffort-pod8071938f_95b8_4459_ae41_c594e77c5047.slice. May 17 00:33:50.944843 systemd[1]: Created slice kubepods-besteffort-podfb24c1ad_1d22_43e4_8f64_d7c39476dce8.slice. May 17 00:33:50.950049 systemd[1]: Created slice kubepods-burstable-podea10e578_7af0_4b41_a269_d133b5ba1bd6.slice. May 17 00:33:50.954739 systemd[1]: Created slice kubepods-besteffort-pod5f48ef61_1a96_4b80_89cb_94f293d8a38e.slice. May 17 00:33:50.958458 systemd[1]: Created slice kubepods-besteffort-pod01f33b6b_253c_4c1e_93af_24789a3c3b42.slice. May 17 00:33:50.962152 systemd[1]: Created slice kubepods-besteffort-podd541225a_f2cf_454c_b680_131039c142b3.slice. May 17 00:33:50.969904 env[1200]: time="2025-05-17T00:33:50.969856691Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\"" May 17 00:33:51.086319 kubelet[1947]: I0517 00:33:51.086259 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-knxg6\" (UniqueName: \"kubernetes.io/projected/d541225a-f2cf-454c-b680-131039c142b3-kube-api-access-knxg6\") pod \"whisker-6d6599c88c-mkdtj\" (UID: \"d541225a-f2cf-454c-b680-131039c142b3\") " pod="calico-system/whisker-6d6599c88c-mkdtj" May 17 00:33:51.086319 kubelet[1947]: I0517 00:33:51.086319 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8071938f-95b8-4459-ae41-c594e77c5047-tigera-ca-bundle\") pod \"calico-kube-controllers-7944dd59d4-4mz58\" (UID: \"8071938f-95b8-4459-ae41-c594e77c5047\") " pod="calico-system/calico-kube-controllers-7944dd59d4-4mz58" May 17 00:33:51.086577 kubelet[1947]: I0517 00:33:51.086339 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fksgm\" (UniqueName: \"kubernetes.io/projected/5f48ef61-1a96-4b80-89cb-94f293d8a38e-kube-api-access-fksgm\") pod \"calico-apiserver-5f7f6d44f8-mqnv5\" (UID: \"5f48ef61-1a96-4b80-89cb-94f293d8a38e\") " pod="calico-apiserver/calico-apiserver-5f7f6d44f8-mqnv5" May 17 00:33:51.086577 kubelet[1947]: I0517 00:33:51.086357 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fb24c1ad-1d22-43e4-8f64-d7c39476dce8-calico-apiserver-certs\") pod \"calico-apiserver-5f7f6d44f8-vgvnz\" (UID: \"fb24c1ad-1d22-43e4-8f64-d7c39476dce8\") " pod="calico-apiserver/calico-apiserver-5f7f6d44f8-vgvnz" May 17 00:33:51.086577 kubelet[1947]: I0517 00:33:51.086560 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7m6gc\" (UniqueName: \"kubernetes.io/projected/fb24c1ad-1d22-43e4-8f64-d7c39476dce8-kube-api-access-7m6gc\") pod \"calico-apiserver-5f7f6d44f8-vgvnz\" (UID: \"fb24c1ad-1d22-43e4-8f64-d7c39476dce8\") " pod="calico-apiserver/calico-apiserver-5f7f6d44f8-vgvnz" May 17 00:33:51.086825 kubelet[1947]: I0517 00:33:51.086588 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z82w2\" (UniqueName: \"kubernetes.io/projected/8071938f-95b8-4459-ae41-c594e77c5047-kube-api-access-z82w2\") pod \"calico-kube-controllers-7944dd59d4-4mz58\" (UID: \"8071938f-95b8-4459-ae41-c594e77c5047\") " pod="calico-system/calico-kube-controllers-7944dd59d4-4mz58" May 17 00:33:51.086825 kubelet[1947]: I0517 00:33:51.086607 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config\" (UniqueName: \"kubernetes.io/configmap/01f33b6b-253c-4c1e-93af-24789a3c3b42-config\") pod \"goldmane-8f77d7b6c-8c4cx\" (UID: \"01f33b6b-253c-4c1e-93af-24789a3c3b42\") " pod="calico-system/goldmane-8f77d7b6c-8c4cx" May 17 00:33:51.086825 kubelet[1947]: I0517 00:33:51.086624 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-key-pair\" (UniqueName: \"kubernetes.io/secret/01f33b6b-253c-4c1e-93af-24789a3c3b42-goldmane-key-pair\") pod \"goldmane-8f77d7b6c-8c4cx\" (UID: \"01f33b6b-253c-4c1e-93af-24789a3c3b42\") " pod="calico-system/goldmane-8f77d7b6c-8c4cx" May 17 00:33:51.086825 kubelet[1947]: I0517 00:33:51.086638 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6460ee60-efd6-4594-b67c-0eef44ca4cb2-config-volume\") pod \"coredns-7c65d6cfc9-6xzzb\" (UID: \"6460ee60-efd6-4594-b67c-0eef44ca4cb2\") " pod="kube-system/coredns-7c65d6cfc9-6xzzb" May 17 00:33:51.086825 kubelet[1947]: I0517 00:33:51.086651 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4srpl\" (UniqueName: \"kubernetes.io/projected/6460ee60-efd6-4594-b67c-0eef44ca4cb2-kube-api-access-4srpl\") pod \"coredns-7c65d6cfc9-6xzzb\" (UID: \"6460ee60-efd6-4594-b67c-0eef44ca4cb2\") " pod="kube-system/coredns-7c65d6cfc9-6xzzb" May 17 00:33:51.086978 kubelet[1947]: I0517 00:33:51.086664 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d541225a-f2cf-454c-b680-131039c142b3-whisker-backend-key-pair\") pod \"whisker-6d6599c88c-mkdtj\" (UID: \"d541225a-f2cf-454c-b680-131039c142b3\") " pod="calico-system/whisker-6d6599c88c-mkdtj" May 17 00:33:51.086978 kubelet[1947]: I0517 00:33:51.086690 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d541225a-f2cf-454c-b680-131039c142b3-whisker-ca-bundle\") pod \"whisker-6d6599c88c-mkdtj\" (UID: \"d541225a-f2cf-454c-b680-131039c142b3\") " pod="calico-system/whisker-6d6599c88c-mkdtj" May 17 00:33:51.086978 kubelet[1947]: I0517 00:33:51.086707 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ea10e578-7af0-4b41-a269-d133b5ba1bd6-config-volume\") pod \"coredns-7c65d6cfc9-qqxfp\" (UID: \"ea10e578-7af0-4b41-a269-d133b5ba1bd6\") " pod="kube-system/coredns-7c65d6cfc9-qqxfp" May 17 00:33:51.086978 kubelet[1947]: I0517 00:33:51.086724 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5f48ef61-1a96-4b80-89cb-94f293d8a38e-calico-apiserver-certs\") pod \"calico-apiserver-5f7f6d44f8-mqnv5\" (UID: \"5f48ef61-1a96-4b80-89cb-94f293d8a38e\") " pod="calico-apiserver/calico-apiserver-5f7f6d44f8-mqnv5" May 17 00:33:51.086978 kubelet[1947]: I0517 00:33:51.086743 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"goldmane-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/01f33b6b-253c-4c1e-93af-24789a3c3b42-goldmane-ca-bundle\") pod \"goldmane-8f77d7b6c-8c4cx\" (UID: \"01f33b6b-253c-4c1e-93af-24789a3c3b42\") " pod="calico-system/goldmane-8f77d7b6c-8c4cx" May 17 00:33:51.087175 kubelet[1947]: I0517 00:33:51.086758 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6gw4x\" (UniqueName: \"kubernetes.io/projected/ea10e578-7af0-4b41-a269-d133b5ba1bd6-kube-api-access-6gw4x\") pod \"coredns-7c65d6cfc9-qqxfp\" (UID: \"ea10e578-7af0-4b41-a269-d133b5ba1bd6\") " pod="kube-system/coredns-7c65d6cfc9-qqxfp" May 17 00:33:51.087175 kubelet[1947]: I0517 00:33:51.086783 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-92dt5\" (UniqueName: \"kubernetes.io/projected/01f33b6b-253c-4c1e-93af-24789a3c3b42-kube-api-access-92dt5\") pod \"goldmane-8f77d7b6c-8c4cx\" (UID: \"01f33b6b-253c-4c1e-93af-24789a3c3b42\") " pod="calico-system/goldmane-8f77d7b6c-8c4cx" May 17 00:33:51.234626 kubelet[1947]: E0517 00:33:51.234521 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:51.235232 env[1200]: time="2025-05-17T00:33:51.235162226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-6xzzb,Uid:6460ee60-efd6-4594-b67c-0eef44ca4cb2,Namespace:kube-system,Attempt:0,}" May 17 00:33:51.242995 env[1200]: time="2025-05-17T00:33:51.242915566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7944dd59d4-4mz58,Uid:8071938f-95b8-4459-ae41-c594e77c5047,Namespace:calico-system,Attempt:0,}" May 17 00:33:51.247701 env[1200]: time="2025-05-17T00:33:51.247665321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-vgvnz,Uid:fb24c1ad-1d22-43e4-8f64-d7c39476dce8,Namespace:calico-apiserver,Attempt:0,}" May 17 00:33:51.253179 kubelet[1947]: E0517 00:33:51.253129 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:33:51.253592 env[1200]: time="2025-05-17T00:33:51.253545193Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-qqxfp,Uid:ea10e578-7af0-4b41-a269-d133b5ba1bd6,Namespace:kube-system,Attempt:0,}" May 17 00:33:51.257393 env[1200]: time="2025-05-17T00:33:51.257355888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-mqnv5,Uid:5f48ef61-1a96-4b80-89cb-94f293d8a38e,Namespace:calico-apiserver,Attempt:0,}" May 17 00:33:51.260879 env[1200]: time="2025-05-17T00:33:51.260835772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-8c4cx,Uid:01f33b6b-253c-4c1e-93af-24789a3c3b42,Namespace:calico-system,Attempt:0,}" May 17 00:33:51.266831 env[1200]: time="2025-05-17T00:33:51.266804671Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6d6599c88c-mkdtj,Uid:d541225a-f2cf-454c-b680-131039c142b3,Namespace:calico-system,Attempt:0,}" May 17 00:33:51.614995 env[1200]: time="2025-05-17T00:33:51.614876457Z" level=error msg="Failed to destroy network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.615354 env[1200]: time="2025-05-17T00:33:51.615308180Z" level=error msg="encountered an error cleaning up failed sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.615404 env[1200]: time="2025-05-17T00:33:51.615371280Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-qqxfp,Uid:ea10e578-7af0-4b41-a269-d133b5ba1bd6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.615730 kubelet[1947]: E0517 00:33:51.615689 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.615806 kubelet[1947]: E0517 00:33:51.615790 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-qqxfp" May 17 00:33:51.615866 kubelet[1947]: E0517 00:33:51.615824 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-qqxfp" May 17 00:33:51.615960 kubelet[1947]: E0517 00:33:51.615921 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-qqxfp_kube-system(ea10e578-7af0-4b41-a269-d133b5ba1bd6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-qqxfp_kube-system(ea10e578-7af0-4b41-a269-d133b5ba1bd6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-qqxfp" podUID="ea10e578-7af0-4b41-a269-d133b5ba1bd6" May 17 00:33:51.629681 env[1200]: time="2025-05-17T00:33:51.629618548Z" level=error msg="Failed to destroy network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.630266 env[1200]: time="2025-05-17T00:33:51.630236402Z" level=error msg="encountered an error cleaning up failed sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.630402 env[1200]: time="2025-05-17T00:33:51.630362929Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-mqnv5,Uid:5f48ef61-1a96-4b80-89cb-94f293d8a38e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.630844 kubelet[1947]: E0517 00:33:51.630796 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.630917 kubelet[1947]: E0517 00:33:51.630883 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-mqnv5" May 17 00:33:51.630917 kubelet[1947]: E0517 00:33:51.630903 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-mqnv5" May 17 00:33:51.631069 kubelet[1947]: E0517 00:33:51.630972 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5f7f6d44f8-mqnv5_calico-apiserver(5f48ef61-1a96-4b80-89cb-94f293d8a38e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5f7f6d44f8-mqnv5_calico-apiserver(5f48ef61-1a96-4b80-89cb-94f293d8a38e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-mqnv5" podUID="5f48ef61-1a96-4b80-89cb-94f293d8a38e" May 17 00:33:51.645326 env[1200]: time="2025-05-17T00:33:51.645262377Z" level=error msg="Failed to destroy network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.645788 env[1200]: time="2025-05-17T00:33:51.645762639Z" level=error msg="encountered an error cleaning up failed sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.645980 env[1200]: time="2025-05-17T00:33:51.645953758Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-vgvnz,Uid:fb24c1ad-1d22-43e4-8f64-d7c39476dce8,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.646442 kubelet[1947]: E0517 00:33:51.646388 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.646504 kubelet[1947]: E0517 00:33:51.646485 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-vgvnz" May 17 00:33:51.646536 kubelet[1947]: E0517 00:33:51.646505 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-vgvnz" May 17 00:33:51.646602 kubelet[1947]: E0517 00:33:51.646572 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5f7f6d44f8-vgvnz_calico-apiserver(fb24c1ad-1d22-43e4-8f64-d7c39476dce8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5f7f6d44f8-vgvnz_calico-apiserver(fb24c1ad-1d22-43e4-8f64-d7c39476dce8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-vgvnz" podUID="fb24c1ad-1d22-43e4-8f64-d7c39476dce8" May 17 00:33:51.647415 env[1200]: time="2025-05-17T00:33:51.647391706Z" level=error msg="Failed to destroy network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.647715 env[1200]: time="2025-05-17T00:33:51.647691261Z" level=error msg="encountered an error cleaning up failed sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.647821 env[1200]: time="2025-05-17T00:33:51.647793483Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-6xzzb,Uid:6460ee60-efd6-4594-b67c-0eef44ca4cb2,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.648217 kubelet[1947]: E0517 00:33:51.648021 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.648217 kubelet[1947]: E0517 00:33:51.648110 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-6xzzb" May 17 00:33:51.648217 kubelet[1947]: E0517 00:33:51.648129 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7c65d6cfc9-6xzzb" May 17 00:33:51.648325 kubelet[1947]: E0517 00:33:51.648172 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7c65d6cfc9-6xzzb_kube-system(6460ee60-efd6-4594-b67c-0eef44ca4cb2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7c65d6cfc9-6xzzb_kube-system(6460ee60-efd6-4594-b67c-0eef44ca4cb2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-6xzzb" podUID="6460ee60-efd6-4594-b67c-0eef44ca4cb2" May 17 00:33:51.651834 env[1200]: time="2025-05-17T00:33:51.651764521Z" level=error msg="Failed to destroy network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.652281 env[1200]: time="2025-05-17T00:33:51.652252018Z" level=error msg="encountered an error cleaning up failed sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.652426 env[1200]: time="2025-05-17T00:33:51.652383887Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7944dd59d4-4mz58,Uid:8071938f-95b8-4459-ae41-c594e77c5047,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.652725 kubelet[1947]: E0517 00:33:51.652688 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.652790 kubelet[1947]: E0517 00:33:51.652749 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7944dd59d4-4mz58" May 17 00:33:51.652790 kubelet[1947]: E0517 00:33:51.652774 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7944dd59d4-4mz58" May 17 00:33:51.652846 kubelet[1947]: E0517 00:33:51.652821 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7944dd59d4-4mz58_calico-system(8071938f-95b8-4459-ae41-c594e77c5047)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7944dd59d4-4mz58_calico-system(8071938f-95b8-4459-ae41-c594e77c5047)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7944dd59d4-4mz58" podUID="8071938f-95b8-4459-ae41-c594e77c5047" May 17 00:33:51.656189 env[1200]: time="2025-05-17T00:33:51.656118379Z" level=error msg="Failed to destroy network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.656778 env[1200]: time="2025-05-17T00:33:51.656722066Z" level=error msg="encountered an error cleaning up failed sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.656881 env[1200]: time="2025-05-17T00:33:51.656790054Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-6d6599c88c-mkdtj,Uid:d541225a-f2cf-454c-b680-131039c142b3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.657106 kubelet[1947]: E0517 00:33:51.657057 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.657106 kubelet[1947]: E0517 00:33:51.657107 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6d6599c88c-mkdtj" May 17 00:33:51.657254 kubelet[1947]: E0517 00:33:51.657125 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/whisker-6d6599c88c-mkdtj" May 17 00:33:51.657254 kubelet[1947]: E0517 00:33:51.657162 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"whisker-6d6599c88c-mkdtj_calico-system(d541225a-f2cf-454c-b680-131039c142b3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"whisker-6d6599c88c-mkdtj_calico-system(d541225a-f2cf-454c-b680-131039c142b3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6d6599c88c-mkdtj" podUID="d541225a-f2cf-454c-b680-131039c142b3" May 17 00:33:51.665183 env[1200]: time="2025-05-17T00:33:51.665104261Z" level=error msg="Failed to destroy network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.665568 env[1200]: time="2025-05-17T00:33:51.665520865Z" level=error msg="encountered an error cleaning up failed sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.665663 env[1200]: time="2025-05-17T00:33:51.665599843Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-8c4cx,Uid:01f33b6b-253c-4c1e-93af-24789a3c3b42,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.665872 kubelet[1947]: E0517 00:33:51.665806 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.665872 kubelet[1947]: E0517 00:33:51.665863 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-8c4cx" May 17 00:33:51.665872 kubelet[1947]: E0517 00:33:51.665887 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/goldmane-8f77d7b6c-8c4cx" May 17 00:33:51.666174 kubelet[1947]: E0517 00:33:51.665934 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"goldmane-8f77d7b6c-8c4cx_calico-system(01f33b6b-253c-4c1e-93af-24789a3c3b42)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"goldmane-8f77d7b6c-8c4cx_calico-system(01f33b6b-253c-4c1e-93af-24789a3c3b42)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-8c4cx" podUID="01f33b6b-253c-4c1e-93af-24789a3c3b42" May 17 00:33:51.900764 systemd[1]: Created slice kubepods-besteffort-podb65ec255_9954_44f6_8517_cb2caadf1655.slice. May 17 00:33:51.902831 env[1200]: time="2025-05-17T00:33:51.902791934Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vkxng,Uid:b65ec255-9954-44f6-8517-cb2caadf1655,Namespace:calico-system,Attempt:0,}" May 17 00:33:51.968072 kubelet[1947]: I0517 00:33:51.968019 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:33:51.968690 env[1200]: time="2025-05-17T00:33:51.968635063Z" level=info msg="StopPodSandbox for \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\"" May 17 00:33:51.969482 kubelet[1947]: I0517 00:33:51.969433 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:33:51.969772 env[1200]: time="2025-05-17T00:33:51.969749131Z" level=info msg="StopPodSandbox for \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\"" May 17 00:33:51.970748 kubelet[1947]: I0517 00:33:51.970711 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:33:51.971078 env[1200]: time="2025-05-17T00:33:51.971052545Z" level=info msg="StopPodSandbox for \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\"" May 17 00:33:51.971947 kubelet[1947]: I0517 00:33:51.971931 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:33:51.972304 env[1200]: time="2025-05-17T00:33:51.972283172Z" level=info msg="StopPodSandbox for \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\"" May 17 00:33:51.973337 kubelet[1947]: I0517 00:33:51.973088 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:33:51.974422 env[1200]: time="2025-05-17T00:33:51.974363039Z" level=info msg="StopPodSandbox for \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\"" May 17 00:33:51.975686 kubelet[1947]: I0517 00:33:51.975634 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:33:51.976361 env[1200]: time="2025-05-17T00:33:51.976319944Z" level=info msg="StopPodSandbox for \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\"" May 17 00:33:51.978219 kubelet[1947]: I0517 00:33:51.978193 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:33:51.978636 env[1200]: time="2025-05-17T00:33:51.978601831Z" level=info msg="StopPodSandbox for \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\"" May 17 00:33:51.991381 env[1200]: time="2025-05-17T00:33:51.991320521Z" level=error msg="StopPodSandbox for \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\" failed" error="failed to destroy network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:51.991859 kubelet[1947]: E0517 00:33:51.991806 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:33:51.991960 kubelet[1947]: E0517 00:33:51.991881 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446"} May 17 00:33:51.992018 kubelet[1947]: E0517 00:33:51.991970 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d541225a-f2cf-454c-b680-131039c142b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:51.992018 kubelet[1947]: E0517 00:33:51.992003 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d541225a-f2cf-454c-b680-131039c142b3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/whisker-6d6599c88c-mkdtj" podUID="d541225a-f2cf-454c-b680-131039c142b3" May 17 00:33:52.006340 env[1200]: time="2025-05-17T00:33:52.006279097Z" level=error msg="StopPodSandbox for \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\" failed" error="failed to destroy network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.006568 kubelet[1947]: E0517 00:33:52.006525 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:33:52.006635 kubelet[1947]: E0517 00:33:52.006591 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d"} May 17 00:33:52.006635 kubelet[1947]: E0517 00:33:52.006630 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fb24c1ad-1d22-43e4-8f64-d7c39476dce8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:52.006754 kubelet[1947]: E0517 00:33:52.006664 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fb24c1ad-1d22-43e4-8f64-d7c39476dce8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-vgvnz" podUID="fb24c1ad-1d22-43e4-8f64-d7c39476dce8" May 17 00:33:52.009649 env[1200]: time="2025-05-17T00:33:52.009538674Z" level=error msg="StopPodSandbox for \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\" failed" error="failed to destroy network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.009912 kubelet[1947]: E0517 00:33:52.009866 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:33:52.009982 kubelet[1947]: E0517 00:33:52.009934 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3"} May 17 00:33:52.009982 kubelet[1947]: E0517 00:33:52.009970 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8071938f-95b8-4459-ae41-c594e77c5047\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:52.010075 kubelet[1947]: E0517 00:33:52.009988 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8071938f-95b8-4459-ae41-c594e77c5047\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7944dd59d4-4mz58" podUID="8071938f-95b8-4459-ae41-c594e77c5047" May 17 00:33:52.027550 env[1200]: time="2025-05-17T00:33:52.027491272Z" level=error msg="StopPodSandbox for \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\" failed" error="failed to destroy network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.027999 kubelet[1947]: E0517 00:33:52.027963 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:33:52.028086 kubelet[1947]: E0517 00:33:52.028021 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a"} May 17 00:33:52.028086 kubelet[1947]: E0517 00:33:52.028071 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5f48ef61-1a96-4b80-89cb-94f293d8a38e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:52.028176 kubelet[1947]: E0517 00:33:52.028093 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5f48ef61-1a96-4b80-89cb-94f293d8a38e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-mqnv5" podUID="5f48ef61-1a96-4b80-89cb-94f293d8a38e" May 17 00:33:52.032487 env[1200]: time="2025-05-17T00:33:52.032457051Z" level=error msg="StopPodSandbox for \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\" failed" error="failed to destroy network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.032817 kubelet[1947]: E0517 00:33:52.032681 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:33:52.032817 kubelet[1947]: E0517 00:33:52.032730 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4"} May 17 00:33:52.032817 kubelet[1947]: E0517 00:33:52.032768 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"01f33b6b-253c-4c1e-93af-24789a3c3b42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:52.032817 kubelet[1947]: E0517 00:33:52.032791 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"01f33b6b-253c-4c1e-93af-24789a3c3b42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/goldmane-8f77d7b6c-8c4cx" podUID="01f33b6b-253c-4c1e-93af-24789a3c3b42" May 17 00:33:52.033145 env[1200]: time="2025-05-17T00:33:52.033101534Z" level=error msg="StopPodSandbox for \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\" failed" error="failed to destroy network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.033296 kubelet[1947]: E0517 00:33:52.033270 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:33:52.033346 kubelet[1947]: E0517 00:33:52.033307 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc"} May 17 00:33:52.033373 kubelet[1947]: E0517 00:33:52.033343 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ea10e578-7af0-4b41-a269-d133b5ba1bd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:52.033442 kubelet[1947]: E0517 00:33:52.033368 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ea10e578-7af0-4b41-a269-d133b5ba1bd6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-qqxfp" podUID="ea10e578-7af0-4b41-a269-d133b5ba1bd6" May 17 00:33:52.034902 env[1200]: time="2025-05-17T00:33:52.034863041Z" level=error msg="StopPodSandbox for \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\" failed" error="failed to destroy network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.035031 kubelet[1947]: E0517 00:33:52.034987 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:33:52.035100 kubelet[1947]: E0517 00:33:52.035017 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6"} May 17 00:33:52.035100 kubelet[1947]: E0517 00:33:52.035054 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6460ee60-efd6-4594-b67c-0eef44ca4cb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:52.035100 kubelet[1947]: E0517 00:33:52.035070 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6460ee60-efd6-4594-b67c-0eef44ca4cb2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7c65d6cfc9-6xzzb" podUID="6460ee60-efd6-4594-b67c-0eef44ca4cb2" May 17 00:33:52.204541 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6-shm.mount: Deactivated successfully. May 17 00:33:52.311321 env[1200]: time="2025-05-17T00:33:52.311253241Z" level=error msg="Failed to destroy network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.311615 env[1200]: time="2025-05-17T00:33:52.311579265Z" level=error msg="encountered an error cleaning up failed sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.311672 env[1200]: time="2025-05-17T00:33:52.311627615Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vkxng,Uid:b65ec255-9954-44f6-8517-cb2caadf1655,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.311866 kubelet[1947]: E0517 00:33:52.311827 1947 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:52.311963 kubelet[1947]: E0517 00:33:52.311886 1947 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vkxng" May 17 00:33:52.311963 kubelet[1947]: E0517 00:33:52.311904 1947 kuberuntime_manager.go:1170] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-vkxng" May 17 00:33:52.312056 kubelet[1947]: E0517 00:33:52.311961 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-vkxng_calico-system(b65ec255-9954-44f6-8517-cb2caadf1655)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-vkxng_calico-system(b65ec255-9954-44f6-8517-cb2caadf1655)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:52.313313 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676-shm.mount: Deactivated successfully. May 17 00:33:52.981745 kubelet[1947]: I0517 00:33:52.981706 1947 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:33:52.983173 env[1200]: time="2025-05-17T00:33:52.982557350Z" level=info msg="StopPodSandbox for \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\"" May 17 00:33:53.028726 env[1200]: time="2025-05-17T00:33:53.028658833Z" level=error msg="StopPodSandbox for \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\" failed" error="failed to destroy network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 17 00:33:53.028938 kubelet[1947]: E0517 00:33:53.028882 1947 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:33:53.029018 kubelet[1947]: E0517 00:33:53.028949 1947 kuberuntime_manager.go:1479] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676"} May 17 00:33:53.029018 kubelet[1947]: E0517 00:33:53.028986 1947 kuberuntime_manager.go:1079] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b65ec255-9954-44f6-8517-cb2caadf1655\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 17 00:33:53.029018 kubelet[1947]: E0517 00:33:53.029008 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b65ec255-9954-44f6-8517-cb2caadf1655\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-vkxng" podUID="b65ec255-9954-44f6-8517-cb2caadf1655" May 17 00:33:57.513763 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3032807579.mount: Deactivated successfully. May 17 00:33:58.124253 env[1200]: time="2025-05-17T00:33:58.124174864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.126902 env[1200]: time="2025-05-17T00:33:58.126850926Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.128598 env[1200]: time="2025-05-17T00:33:58.128554019Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.129876 env[1200]: time="2025-05-17T00:33:58.129844657Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:7cb61ea47ca0a8e6d0526a42da4f1e399b37ccd13339d0776d272465cb7ee012,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:33:58.130254 env[1200]: time="2025-05-17T00:33:58.130221335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.30.0\" returns image reference \"sha256:d12dae9bc0999225efe30fd5618bcf2195709d54ed2840234f5006aab5f7d721\"" May 17 00:33:58.139881 env[1200]: time="2025-05-17T00:33:58.139811942Z" level=info msg="CreateContainer within sandbox \"bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 17 00:33:58.158041 env[1200]: time="2025-05-17T00:33:58.157961705Z" level=info msg="CreateContainer within sandbox \"bb0a7f9488465bd6cd9e641a2ca57e87fbfd943f1efc3eca2941c46aebae5415\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"1b8bb8cd765a52756518a9345f5002dd1abc175a9c17ef1f195cbcc063f91b4b\"" May 17 00:33:58.158555 env[1200]: time="2025-05-17T00:33:58.158529843Z" level=info msg="StartContainer for \"1b8bb8cd765a52756518a9345f5002dd1abc175a9c17ef1f195cbcc063f91b4b\"" May 17 00:33:58.173900 systemd[1]: Started cri-containerd-1b8bb8cd765a52756518a9345f5002dd1abc175a9c17ef1f195cbcc063f91b4b.scope. May 17 00:33:58.191000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.197225 kernel: kauditd_printk_skb: 34 callbacks suppressed May 17 00:33:58.197290 kernel: audit: type=1400 audit(1747442038.191:1027): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.197314 kernel: audit: type=1300 audit(1747442038.191:1027): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc7502cb5f8 items=0 ppid=2510 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.191000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc7502cb5f8 items=0 ppid=2510 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162386262386364373635613532373536353138613933343566353030 May 17 00:33:58.207315 kernel: audit: type=1327 audit(1747442038.191:1027): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162386262386364373635613532373536353138613933343566353030 May 17 00:33:58.207378 kernel: audit: type=1400 audit(1747442038.192:1028): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.214090 kernel: audit: type=1400 audit(1747442038.192:1028): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.214183 kernel: audit: type=1400 audit(1747442038.192:1028): avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.220804 kernel: audit: type=1400 audit(1747442038.192:1028): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.220850 kernel: audit: type=1400 audit(1747442038.192:1028): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.229656 kernel: audit: type=1400 audit(1747442038.192:1028): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.234398 kernel: audit: type=1400 audit(1747442038.192:1028): avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.192000 audit: BPF prog-id=143 op=LOAD May 17 00:33:58.192000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00029b308 items=0 ppid=2510 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162386262386364373635613532373536353138613933343566353030 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.201000 audit: BPF prog-id=144 op=LOAD May 17 00:33:58.201000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00029b358 items=0 ppid=2510 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162386262386364373635613532373536353138613933343566353030 May 17 00:33:58.209000 audit: BPF prog-id=144 op=UNLOAD May 17 00:33:58.209000 audit: BPF prog-id=143 op=UNLOAD May 17 00:33:58.209000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:33:58.209000 audit: BPF prog-id=145 op=LOAD May 17 00:33:58.209000 audit[3235]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00029b3e8 items=0 ppid=2510 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162386262386364373635613532373536353138613933343566353030 May 17 00:33:58.241056 env[1200]: time="2025-05-17T00:33:58.241008558Z" level=info msg="StartContainer for \"1b8bb8cd765a52756518a9345f5002dd1abc175a9c17ef1f195cbcc063f91b4b\" returns successfully" May 17 00:33:58.333892 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 17 00:33:58.334041 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 17 00:33:58.396917 env[1200]: time="2025-05-17T00:33:58.396788618Z" level=info msg="StopPodSandbox for \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\"" May 17 00:33:58.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.99:22-10.0.0.1:38464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.419300 systemd[1]: Started sshd@7-10.0.0.99:22-10.0.0.1:38464.service. May 17 00:33:58.462000 audit[3303]: USER_ACCT pid=3303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.463694 sshd[3303]: Accepted publickey for core from 10.0.0.1 port 38464 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:33:58.463000 audit[3303]: CRED_ACQ pid=3303 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.463000 audit[3303]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb7a7aaa0 a2=3 a3=0 items=0 ppid=1 pid=3303 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:58.463000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:33:58.465283 sshd[3303]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:33:58.470697 systemd[1]: Started session-8.scope. May 17 00:33:58.471674 systemd-logind[1188]: New session 8 of user core. May 17 00:33:58.479000 audit[3303]: USER_START pid=3303 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.481000 audit[3313]: CRED_ACQ pid=3313 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.458 [INFO][3293] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.458 [INFO][3293] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" iface="eth0" netns="/var/run/netns/cni-1c1da786-9ac2-cc4b-2db8-acf31c7ca058" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.459 [INFO][3293] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" iface="eth0" netns="/var/run/netns/cni-1c1da786-9ac2-cc4b-2db8-acf31c7ca058" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.459 [INFO][3293] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" iface="eth0" netns="/var/run/netns/cni-1c1da786-9ac2-cc4b-2db8-acf31c7ca058" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.459 [INFO][3293] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.459 [INFO][3293] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.520 [INFO][3307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.520 [INFO][3307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.521 [INFO][3307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.527 [WARNING][3307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.527 [INFO][3307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.529 [INFO][3307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:33:58.533701 env[1200]: 2025-05-17 00:33:58.531 [INFO][3293] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:33:58.535733 env[1200]: time="2025-05-17T00:33:58.534297696Z" level=info msg="TearDown network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\" successfully" May 17 00:33:58.535733 env[1200]: time="2025-05-17T00:33:58.534329245Z" level=info msg="StopPodSandbox for \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\" returns successfully" May 17 00:33:58.536355 systemd[1]: run-netns-cni\x2d1c1da786\x2d9ac2\x2dcc4b\x2d2db8\x2dacf31c7ca058.mount: Deactivated successfully. May 17 00:33:58.618508 sshd[3303]: pam_unix(sshd:session): session closed for user core May 17 00:33:58.618000 audit[3303]: USER_END pid=3303 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.618000 audit[3303]: CRED_DISP pid=3303 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:33:58.621692 systemd[1]: sshd@7-10.0.0.99:22-10.0.0.1:38464.service: Deactivated successfully. May 17 00:33:58.622622 systemd[1]: session-8.scope: Deactivated successfully. May 17 00:33:58.620000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.99:22-10.0.0.1:38464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:33:58.623180 systemd-logind[1188]: Session 8 logged out. Waiting for processes to exit. May 17 00:33:58.623876 systemd-logind[1188]: Removed session 8. May 17 00:33:58.630269 kubelet[1947]: I0517 00:33:58.630230 1947 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-knxg6\" (UniqueName: \"kubernetes.io/projected/d541225a-f2cf-454c-b680-131039c142b3-kube-api-access-knxg6\") pod \"d541225a-f2cf-454c-b680-131039c142b3\" (UID: \"d541225a-f2cf-454c-b680-131039c142b3\") " May 17 00:33:58.630549 kubelet[1947]: I0517 00:33:58.630275 1947 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d541225a-f2cf-454c-b680-131039c142b3-whisker-backend-key-pair\") pod \"d541225a-f2cf-454c-b680-131039c142b3\" (UID: \"d541225a-f2cf-454c-b680-131039c142b3\") " May 17 00:33:58.630549 kubelet[1947]: I0517 00:33:58.630292 1947 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d541225a-f2cf-454c-b680-131039c142b3-whisker-ca-bundle\") pod \"d541225a-f2cf-454c-b680-131039c142b3\" (UID: \"d541225a-f2cf-454c-b680-131039c142b3\") " May 17 00:33:58.630761 kubelet[1947]: I0517 00:33:58.630634 1947 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/d541225a-f2cf-454c-b680-131039c142b3-whisker-ca-bundle" (OuterVolumeSpecName: "whisker-ca-bundle") pod "d541225a-f2cf-454c-b680-131039c142b3" (UID: "d541225a-f2cf-454c-b680-131039c142b3"). InnerVolumeSpecName "whisker-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 17 00:33:58.635192 kubelet[1947]: I0517 00:33:58.635149 1947 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/d541225a-f2cf-454c-b680-131039c142b3-whisker-backend-key-pair" (OuterVolumeSpecName: "whisker-backend-key-pair") pod "d541225a-f2cf-454c-b680-131039c142b3" (UID: "d541225a-f2cf-454c-b680-131039c142b3"). InnerVolumeSpecName "whisker-backend-key-pair". PluginName "kubernetes.io/secret", VolumeGidValue "" May 17 00:33:58.635408 systemd[1]: var-lib-kubelet-pods-d541225a\x2df2cf\x2d454c\x2db680\x2d131039c142b3-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dknxg6.mount: Deactivated successfully. May 17 00:33:58.635489 systemd[1]: var-lib-kubelet-pods-d541225a\x2df2cf\x2d454c\x2db680\x2d131039c142b3-volumes-kubernetes.io\x7esecret-whisker\x2dbackend\x2dkey\x2dpair.mount: Deactivated successfully. May 17 00:33:58.636859 kubelet[1947]: I0517 00:33:58.636790 1947 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/d541225a-f2cf-454c-b680-131039c142b3-kube-api-access-knxg6" (OuterVolumeSpecName: "kube-api-access-knxg6") pod "d541225a-f2cf-454c-b680-131039c142b3" (UID: "d541225a-f2cf-454c-b680-131039c142b3"). InnerVolumeSpecName "kube-api-access-knxg6". PluginName "kubernetes.io/projected", VolumeGidValue "" May 17 00:33:58.730905 kubelet[1947]: I0517 00:33:58.730767 1947 reconciler_common.go:293] "Volume detached for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/d541225a-f2cf-454c-b680-131039c142b3-whisker-backend-key-pair\") on node \"localhost\" DevicePath \"\"" May 17 00:33:58.730905 kubelet[1947]: I0517 00:33:58.730813 1947 reconciler_common.go:293] "Volume detached for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d541225a-f2cf-454c-b680-131039c142b3-whisker-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 17 00:33:58.730905 kubelet[1947]: I0517 00:33:58.730822 1947 reconciler_common.go:293] "Volume detached for volume \"kube-api-access-knxg6\" (UniqueName: \"kubernetes.io/projected/d541225a-f2cf-454c-b680-131039c142b3-kube-api-access-knxg6\") on node \"localhost\" DevicePath \"\"" May 17 00:33:58.902055 systemd[1]: Removed slice kubepods-besteffort-podd541225a_f2cf_454c_b680_131039c142b3.slice. May 17 00:33:59.019136 kubelet[1947]: I0517 00:33:59.018993 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-q5wvd" podStartSLOduration=1.3793243880000001 podStartE2EDuration="19.018974153s" podCreationTimestamp="2025-05-17 00:33:40 +0000 UTC" firstStartedPulling="2025-05-17 00:33:40.491448459 +0000 UTC m=+17.666801950" lastFinishedPulling="2025-05-17 00:33:58.131098224 +0000 UTC m=+35.306451715" observedRunningTime="2025-05-17 00:33:59.018732649 +0000 UTC m=+36.194086140" watchObservedRunningTime="2025-05-17 00:33:59.018974153 +0000 UTC m=+36.194327644" May 17 00:33:59.523046 systemd[1]: Created slice kubepods-besteffort-pod36c092a0_1ee9_4f64_9ad5_c04a441646ec.slice. May 17 00:33:59.602000 audit[3394]: AVC avc: denied { write } for pid=3394 comm="tee" name="fd" dev="proc" ino=26646 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:33:59.602000 audit[3394]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd060427da a2=241 a3=1b6 items=1 ppid=3351 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.602000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 17 00:33:59.602000 audit: PATH item=0 name="/dev/fd/63" inode=25828 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:59.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:33:59.610000 audit[3386]: AVC avc: denied { write } for pid=3386 comm="tee" name="fd" dev="proc" ino=24025 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:33:59.610000 audit[3386]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff74b117eb a2=241 a3=1b6 items=1 ppid=3358 pid=3386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.610000 audit: CWD cwd="/etc/service/enabled/cni/log" May 17 00:33:59.610000 audit: PATH item=0 name="/dev/fd/63" inode=25827 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:59.610000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:33:59.623000 audit[3411]: AVC avc: denied { write } for pid=3411 comm="tee" name="fd" dev="proc" ino=26653 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:33:59.623000 audit[3411]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe321467e9 a2=241 a3=1b6 items=1 ppid=3355 pid=3411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.623000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 17 00:33:59.623000 audit: PATH item=0 name="/dev/fd/63" inode=24030 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:59.634000 audit[3421]: AVC avc: denied { write } for pid=3421 comm="tee" name="fd" dev="proc" ino=24036 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:33:59.623000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:33:59.634000 audit[3421]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd815757d9 a2=241 a3=1b6 items=1 ppid=3349 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.634000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 17 00:33:59.634000 audit: PATH item=0 name="/dev/fd/63" inode=26660 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:59.634000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:33:59.637413 kubelet[1947]: I0517 00:33:59.637362 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/36c092a0-1ee9-4f64-9ad5-c04a441646ec-whisker-ca-bundle\") pod \"whisker-66fc645cdc-cm9xr\" (UID: \"36c092a0-1ee9-4f64-9ad5-c04a441646ec\") " pod="calico-system/whisker-66fc645cdc-cm9xr" May 17 00:33:59.637752 kubelet[1947]: I0517 00:33:59.637424 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"whisker-backend-key-pair\" (UniqueName: \"kubernetes.io/secret/36c092a0-1ee9-4f64-9ad5-c04a441646ec-whisker-backend-key-pair\") pod \"whisker-66fc645cdc-cm9xr\" (UID: \"36c092a0-1ee9-4f64-9ad5-c04a441646ec\") " pod="calico-system/whisker-66fc645cdc-cm9xr" May 17 00:33:59.637752 kubelet[1947]: I0517 00:33:59.637448 1947 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qq764\" (UniqueName: \"kubernetes.io/projected/36c092a0-1ee9-4f64-9ad5-c04a441646ec-kube-api-access-qq764\") pod \"whisker-66fc645cdc-cm9xr\" (UID: \"36c092a0-1ee9-4f64-9ad5-c04a441646ec\") " pod="calico-system/whisker-66fc645cdc-cm9xr" May 17 00:33:59.637000 audit[3426]: AVC avc: denied { write } for pid=3426 comm="tee" name="fd" dev="proc" ino=25051 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:33:59.637000 audit[3426]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd873e67e9 a2=241 a3=1b6 items=1 ppid=3356 pid=3426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.637000 audit: CWD cwd="/etc/service/enabled/felix/log" May 17 00:33:59.637000 audit: PATH item=0 name="/dev/fd/63" inode=26662 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:59.637000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:33:59.650000 audit[3432]: AVC avc: denied { write } for pid=3432 comm="tee" name="fd" dev="proc" ino=25055 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:33:59.650000 audit[3432]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda39ef7e9 a2=241 a3=1b6 items=1 ppid=3366 pid=3432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.650000 audit: CWD cwd="/etc/service/enabled/confd/log" May 17 00:33:59.650000 audit: PATH item=0 name="/dev/fd/63" inode=25834 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:59.650000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:33:59.653000 audit[3428]: AVC avc: denied { write } for pid=3428 comm="tee" name="fd" dev="proc" ino=26665 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 17 00:33:59.653000 audit[3428]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd3ee97ea a2=241 a3=1b6 items=1 ppid=3352 pid=3428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:33:59.653000 audit: CWD cwd="/etc/service/enabled/bird/log" May 17 00:33:59.653000 audit: PATH item=0 name="/dev/fd/63" inode=24038 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 17 00:33:59.653000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 17 00:33:59.827045 env[1200]: time="2025-05-17T00:33:59.826913309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-66fc645cdc-cm9xr,Uid:36c092a0-1ee9-4f64-9ad5-c04a441646ec,Namespace:calico-system,Attempt:0,}" May 17 00:33:59.998477 kubelet[1947]: I0517 00:33:59.998449 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:34:00.102231 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:34:00.102349 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali25cdfcfa147: link becomes ready May 17 00:34:00.099508 systemd-networkd[1022]: cali25cdfcfa147: Link UP May 17 00:34:00.102831 systemd-networkd[1022]: cali25cdfcfa147: Gained carrier May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.006 [INFO][3441] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.023 [INFO][3441] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-whisker--66fc645cdc--cm9xr-eth0 whisker-66fc645cdc- calico-system 36c092a0-1ee9-4f64-9ad5-c04a441646ec 933 0 2025-05-17 00:33:59 +0000 UTC map[app.kubernetes.io/name:whisker k8s-app:whisker pod-template-hash:66fc645cdc projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:whisker] map[] [] [] []} {k8s localhost whisker-66fc645cdc-cm9xr eth0 whisker [] [] [kns.calico-system ksa.calico-system.whisker] cali25cdfcfa147 [] [] }} ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.023 [INFO][3441] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.056 [INFO][3456] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" HandleID="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Workload="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.056 [INFO][3456] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" HandleID="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Workload="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000138480), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"whisker-66fc645cdc-cm9xr", "timestamp":"2025-05-17 00:34:00.056799392 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.057 [INFO][3456] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.057 [INFO][3456] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.057 [INFO][3456] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.064 [INFO][3456] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.069 [INFO][3456] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.073 [INFO][3456] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.076 [INFO][3456] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.078 [INFO][3456] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.078 [INFO][3456] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.080 [INFO][3456] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1 May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.083 [INFO][3456] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.088 [INFO][3456] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.088 [INFO][3456] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" host="localhost" May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.088 [INFO][3456] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:00.233927 env[1200]: 2025-05-17 00:34:00.088 [INFO][3456] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" HandleID="k8s-pod-network.39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Workload="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" May 17 00:34:00.234711 env[1200]: 2025-05-17 00:34:00.091 [INFO][3441] cni-plugin/k8s.go 418: Populated endpoint ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--66fc645cdc--cm9xr-eth0", GenerateName:"whisker-66fc645cdc-", Namespace:"calico-system", SelfLink:"", UID:"36c092a0-1ee9-4f64-9ad5-c04a441646ec", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"66fc645cdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"whisker-66fc645cdc-cm9xr", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali25cdfcfa147", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:00.234711 env[1200]: 2025-05-17 00:34:00.091 [INFO][3441] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.129/32] ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" May 17 00:34:00.234711 env[1200]: 2025-05-17 00:34:00.091 [INFO][3441] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali25cdfcfa147 ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" May 17 00:34:00.234711 env[1200]: 2025-05-17 00:34:00.102 [INFO][3441] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" May 17 00:34:00.234711 env[1200]: 2025-05-17 00:34:00.102 [INFO][3441] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-whisker--66fc645cdc--cm9xr-eth0", GenerateName:"whisker-66fc645cdc-", Namespace:"calico-system", SelfLink:"", UID:"36c092a0-1ee9-4f64-9ad5-c04a441646ec", ResourceVersion:"933", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 59, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"whisker", "k8s-app":"whisker", "pod-template-hash":"66fc645cdc", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"whisker"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1", Pod:"whisker-66fc645cdc-cm9xr", Endpoint:"eth0", ServiceAccountName:"whisker", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.whisker"}, InterfaceName:"cali25cdfcfa147", MAC:"36:ee:57:c0:2a:91", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:00.234711 env[1200]: 2025-05-17 00:34:00.231 [INFO][3441] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1" Namespace="calico-system" Pod="whisker-66fc645cdc-cm9xr" WorkloadEndpoint="localhost-k8s-whisker--66fc645cdc--cm9xr-eth0" May 17 00:34:00.285224 env[1200]: time="2025-05-17T00:34:00.285136019Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:00.285224 env[1200]: time="2025-05-17T00:34:00.285175623Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:00.285224 env[1200]: time="2025-05-17T00:34:00.285185241Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:00.285475 env[1200]: time="2025-05-17T00:34:00.285301059Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1 pid=3478 runtime=io.containerd.runc.v2 May 17 00:34:00.296068 systemd[1]: Started cri-containerd-39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1.scope. May 17 00:34:00.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.306000 audit: BPF prog-id=146 op=LOAD May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3478 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663139616566336237653265663165636433326332626666353764 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3478 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663139616566336237653265663165636433326332626666353764 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit: BPF prog-id=147 op=LOAD May 17 00:34:00.307000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00023a670 items=0 ppid=3478 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663139616566336237653265663165636433326332626666353764 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit: BPF prog-id=148 op=LOAD May 17 00:34:00.307000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00023a6b8 items=0 ppid=3478 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663139616566336237653265663165636433326332626666353764 May 17 00:34:00.307000 audit: BPF prog-id=148 op=UNLOAD May 17 00:34:00.307000 audit: BPF prog-id=147 op=UNLOAD May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:00.307000 audit: BPF prog-id=149 op=LOAD May 17 00:34:00.307000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00023aac8 items=0 ppid=3478 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:00.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663139616566336237653265663165636433326332626666353764 May 17 00:34:00.309457 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:00.331822 env[1200]: time="2025-05-17T00:34:00.331763456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:whisker-66fc645cdc-cm9xr,Uid:36c092a0-1ee9-4f64-9ad5-c04a441646ec,Namespace:calico-system,Attempt:0,} returns sandbox id \"39f19aef3b7e2ef1ecd32c2bff57d1ce61b81478a8516dc9d693ea8c46d698a1\"" May 17 00:34:00.333420 env[1200]: time="2025-05-17T00:34:00.333365708Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:34:00.616477 env[1200]: time="2025-05-17T00:34:00.616415063Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:00.617534 env[1200]: time="2025-05-17T00:34:00.617496186Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:00.617784 kubelet[1947]: E0517 00:34:00.617729 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:00.617849 kubelet[1947]: E0517 00:34:00.617799 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:00.619251 kubelet[1947]: E0517 00:34:00.619208 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:3587bf1e80664abdaf5d78c57ed793ea,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-qq764,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-66fc645cdc-cm9xr_calico-system(36c092a0-1ee9-4f64-9ad5-c04a441646ec): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:00.621369 env[1200]: time="2025-05-17T00:34:00.621288876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:34:00.854002 env[1200]: time="2025-05-17T00:34:00.853941758Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:00.898456 kubelet[1947]: I0517 00:34:00.898335 1947 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="d541225a-f2cf-454c-b680-131039c142b3" path="/var/lib/kubelet/pods/d541225a-f2cf-454c-b680-131039c142b3/volumes" May 17 00:34:00.954599 env[1200]: time="2025-05-17T00:34:00.954515362Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:00.954831 kubelet[1947]: E0517 00:34:00.954775 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:00.954891 kubelet[1947]: E0517 00:34:00.954837 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:00.955001 kubelet[1947]: E0517 00:34:00.954954 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-qq764,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-66fc645cdc-cm9xr_calico-system(36c092a0-1ee9-4f64-9ad5-c04a441646ec): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:00.956205 kubelet[1947]: E0517 00:34:00.956136 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-66fc645cdc-cm9xr" podUID="36c092a0-1ee9-4f64-9ad5-c04a441646ec" May 17 00:34:01.003010 kubelet[1947]: E0517 00:34:01.002952 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-66fc645cdc-cm9xr" podUID="36c092a0-1ee9-4f64-9ad5-c04a441646ec" May 17 00:34:01.022000 audit[3536]: NETFILTER_CFG table=filter:99 family=2 entries=22 op=nft_register_rule pid=3536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:01.022000 audit[3536]: SYSCALL arch=c000003e syscall=46 success=yes exit=8224 a0=3 a1=7ffdee123250 a2=0 a3=7ffdee12323c items=0 ppid=2053 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:01.029000 audit[3536]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:01.029000 audit[3536]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdee123250 a2=0 a3=0 items=0 ppid=2053 pid=3536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:01.029000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:01.978213 systemd-networkd[1022]: cali25cdfcfa147: Gained IPv6LL May 17 00:34:02.009422 kubelet[1947]: E0517 00:34:02.009374 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-66fc645cdc-cm9xr" podUID="36c092a0-1ee9-4f64-9ad5-c04a441646ec" May 17 00:34:03.623521 systemd[1]: Started sshd@8-10.0.0.99:22-10.0.0.1:38470.service. May 17 00:34:03.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.99:22-10.0.0.1:38470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.630502 kernel: kauditd_printk_skb: 142 callbacks suppressed May 17 00:34:03.630593 kernel: audit: type=1130 audit(1747442043.622:1069): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.99:22-10.0.0.1:38470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.674000 audit[3587]: USER_ACCT pid=3587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.676081 sshd[3587]: Accepted publickey for core from 10.0.0.1 port 38470 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:03.678000 audit[3587]: CRED_ACQ pid=3587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.680471 sshd[3587]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:03.683705 kernel: audit: type=1101 audit(1747442043.674:1070): pid=3587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.683827 kernel: audit: type=1103 audit(1747442043.678:1071): pid=3587 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.683849 kernel: audit: type=1006 audit(1747442043.678:1072): pid=3587 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 17 00:34:03.684228 systemd-logind[1188]: New session 9 of user core. May 17 00:34:03.685171 systemd[1]: Started session-9.scope. May 17 00:34:03.692751 kernel: audit: type=1300 audit(1747442043.678:1072): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc1c41270 a2=3 a3=0 items=0 ppid=1 pid=3587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.678000 audit[3587]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc1c41270 a2=3 a3=0 items=0 ppid=1 pid=3587 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:03.678000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:03.698203 kernel: audit: type=1327 audit(1747442043.678:1072): proctitle=737368643A20636F7265205B707269765D May 17 00:34:03.698233 kernel: audit: type=1105 audit(1747442043.687:1073): pid=3587 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.687000 audit[3587]: USER_START pid=3587 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.702344 kernel: audit: type=1103 audit(1747442043.688:1074): pid=3589 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.688000 audit[3589]: CRED_ACQ pid=3589 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.795464 sshd[3587]: pam_unix(sshd:session): session closed for user core May 17 00:34:03.795000 audit[3587]: USER_END pid=3587 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.797831 systemd[1]: sshd@8-10.0.0.99:22-10.0.0.1:38470.service: Deactivated successfully. May 17 00:34:03.798497 systemd[1]: session-9.scope: Deactivated successfully. May 17 00:34:03.799083 systemd-logind[1188]: Session 9 logged out. Waiting for processes to exit. May 17 00:34:03.799747 systemd-logind[1188]: Removed session 9. May 17 00:34:03.795000 audit[3587]: CRED_DISP pid=3587 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.804761 kernel: audit: type=1106 audit(1747442043.795:1075): pid=3587 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.804818 kernel: audit: type=1104 audit(1747442043.795:1076): pid=3587 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:03.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.99:22-10.0.0.1:38470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:03.896577 env[1200]: time="2025-05-17T00:34:03.896461277Z" level=info msg="StopPodSandbox for \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\"" May 17 00:34:04.025183 kubelet[1947]: I0517 00:34:04.025136 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.048 [INFO][3621] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.048 [INFO][3621] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" iface="eth0" netns="/var/run/netns/cni-a14fb47a-1071-6ddc-8662-c5e49142a239" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.048 [INFO][3621] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" iface="eth0" netns="/var/run/netns/cni-a14fb47a-1071-6ddc-8662-c5e49142a239" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.048 [INFO][3621] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" iface="eth0" netns="/var/run/netns/cni-a14fb47a-1071-6ddc-8662-c5e49142a239" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.048 [INFO][3621] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.048 [INFO][3621] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.069 [INFO][3660] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.069 [INFO][3660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.069 [INFO][3660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.075 [WARNING][3660] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.075 [INFO][3660] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.076 [INFO][3660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:04.080215 env[1200]: 2025-05-17 00:34:04.078 [INFO][3621] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:04.080828 env[1200]: time="2025-05-17T00:34:04.080345301Z" level=info msg="TearDown network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\" successfully" May 17 00:34:04.080828 env[1200]: time="2025-05-17T00:34:04.080389173Z" level=info msg="StopPodSandbox for \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\" returns successfully" May 17 00:34:04.081308 kubelet[1947]: E0517 00:34:04.081128 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:04.082015 env[1200]: time="2025-05-17T00:34:04.081680360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-6xzzb,Uid:6460ee60-efd6-4594-b67c-0eef44ca4cb2,Namespace:kube-system,Attempt:1,}" May 17 00:34:04.082371 systemd[1]: run-netns-cni\x2da14fb47a\x2d1071\x2d6ddc\x2d8662\x2dc5e49142a239.mount: Deactivated successfully. May 17 00:34:04.114010 systemd[1]: run-containerd-runc-k8s.io-1b8bb8cd765a52756518a9345f5002dd1abc175a9c17ef1f195cbcc063f91b4b-runc.FUmUDy.mount: Deactivated successfully. May 17 00:34:04.416749 systemd-networkd[1022]: calida34622bbab: Link UP May 17 00:34:04.419097 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:34:04.419203 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calida34622bbab: link becomes ready May 17 00:34:04.419183 systemd-networkd[1022]: calida34622bbab: Gained carrier May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.351 [INFO][3695] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.361 [INFO][3695] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0 coredns-7c65d6cfc9- kube-system 6460ee60-efd6-4594-b67c-0eef44ca4cb2 987 0 2025-05-17 00:33:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7c65d6cfc9-6xzzb eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calida34622bbab [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.361 [INFO][3695] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.384 [INFO][3710] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" HandleID="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.384 [INFO][3710] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" HandleID="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00004f660), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7c65d6cfc9-6xzzb", "timestamp":"2025-05-17 00:34:04.384319971 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.384 [INFO][3710] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.384 [INFO][3710] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.384 [INFO][3710] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.391 [INFO][3710] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.394 [INFO][3710] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.399 [INFO][3710] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.401 [INFO][3710] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.403 [INFO][3710] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.403 [INFO][3710] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.404 [INFO][3710] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0 May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.407 [INFO][3710] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.412 [INFO][3710] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.412 [INFO][3710] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" host="localhost" May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.412 [INFO][3710] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:04.430718 env[1200]: 2025-05-17 00:34:04.412 [INFO][3710] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" HandleID="k8s-pod-network.73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.431511 env[1200]: 2025-05-17 00:34:04.415 [INFO][3695] cni-plugin/k8s.go 418: Populated endpoint ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6460ee60-efd6-4594-b67c-0eef44ca4cb2", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7c65d6cfc9-6xzzb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida34622bbab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:04.431511 env[1200]: 2025-05-17 00:34:04.415 [INFO][3695] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.130/32] ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.431511 env[1200]: 2025-05-17 00:34:04.415 [INFO][3695] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calida34622bbab ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.431511 env[1200]: 2025-05-17 00:34:04.419 [INFO][3695] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.431511 env[1200]: 2025-05-17 00:34:04.419 [INFO][3695] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6460ee60-efd6-4594-b67c-0eef44ca4cb2", ResourceVersion:"987", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0", Pod:"coredns-7c65d6cfc9-6xzzb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida34622bbab", MAC:"06:af:3b:36:19:ad", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:04.431511 env[1200]: 2025-05-17 00:34:04.428 [INFO][3695] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0" Namespace="kube-system" Pod="coredns-7c65d6cfc9-6xzzb" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:04.439754 env[1200]: time="2025-05-17T00:34:04.439658268Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:04.439754 env[1200]: time="2025-05-17T00:34:04.439713021Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:04.439754 env[1200]: time="2025-05-17T00:34:04.439725033Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:04.440205 env[1200]: time="2025-05-17T00:34:04.440138601Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0 pid=3732 runtime=io.containerd.runc.v2 May 17 00:34:04.451951 systemd[1]: Started cri-containerd-73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0.scope. May 17 00:34:04.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit: BPF prog-id=150 op=LOAD May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3732 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733646639656230366565653165303836653463636165646134363939 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3732 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733646639656230366565653165303836653463636165646134363939 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit: BPF prog-id=151 op=LOAD May 17 00:34:04.462000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000f1d90 items=0 ppid=3732 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733646639656230366565653165303836653463636165646134363939 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit: BPF prog-id=152 op=LOAD May 17 00:34:04.462000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000f1dd8 items=0 ppid=3732 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733646639656230366565653165303836653463636165646134363939 May 17 00:34:04.462000 audit: BPF prog-id=152 op=UNLOAD May 17 00:34:04.462000 audit: BPF prog-id=151 op=UNLOAD May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.462000 audit: BPF prog-id=153 op=LOAD May 17 00:34:04.462000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e41e8 items=0 ppid=3732 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733646639656230366565653165303836653463636165646134363939 May 17 00:34:04.464532 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:04.487342 env[1200]: time="2025-05-17T00:34:04.487279463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-6xzzb,Uid:6460ee60-efd6-4594-b67c-0eef44ca4cb2,Namespace:kube-system,Attempt:1,} returns sandbox id \"73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0\"" May 17 00:34:04.488002 kubelet[1947]: E0517 00:34:04.487980 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:04.490197 env[1200]: time="2025-05-17T00:34:04.490163493Z" level=info msg="CreateContainer within sandbox \"73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:34:04.508970 env[1200]: time="2025-05-17T00:34:04.508911887Z" level=info msg="CreateContainer within sandbox \"73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8a691b63e7c110a4adf5f52c0c11076f16e00623b8b9b821cd26141e8ea50e66\"" May 17 00:34:04.509524 env[1200]: time="2025-05-17T00:34:04.509487308Z" level=info msg="StartContainer for \"8a691b63e7c110a4adf5f52c0c11076f16e00623b8b9b821cd26141e8ea50e66\"" May 17 00:34:04.522380 systemd[1]: Started cri-containerd-8a691b63e7c110a4adf5f52c0c11076f16e00623b8b9b821cd26141e8ea50e66.scope. May 17 00:34:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit: BPF prog-id=154 op=LOAD May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3732 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363931623633653763313130613461646635663532633063313130 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3732 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363931623633653763313130613461646635663532633063313130 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit: BPF prog-id=155 op=LOAD May 17 00:34:04.552000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df400 items=0 ppid=3732 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363931623633653763313130613461646635663532633063313130 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit: BPF prog-id=156 op=LOAD May 17 00:34:04.552000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df448 items=0 ppid=3732 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363931623633653763313130613461646635663532633063313130 May 17 00:34:04.552000 audit: BPF prog-id=156 op=UNLOAD May 17 00:34:04.552000 audit: BPF prog-id=155 op=UNLOAD May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:04.552000 audit: BPF prog-id=157 op=LOAD May 17 00:34:04.552000 audit[3775]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001df858 items=0 ppid=3732 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:04.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363931623633653763313130613461646635663532633063313130 May 17 00:34:04.597813 env[1200]: time="2025-05-17T00:34:04.597714173Z" level=info msg="StartContainer for \"8a691b63e7c110a4adf5f52c0c11076f16e00623b8b9b821cd26141e8ea50e66\" returns successfully" May 17 00:34:04.813000 audit[3786]: AVC avc: denied { getattr } for pid=3786 comm="coredns" path="cgroup:[4026532749]" dev="nsfs" ino=4026532749 scontext=system_u:system_r:svirt_lxc_net_t:s0:c483,c873 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:34:04.813000 audit[3786]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00005a9a8 a2=c00060cac8 a3=0 items=0 ppid=3732 pid=3786 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c483,c873 key=(null) May 17 00:34:04.813000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:34:04.993016 kubelet[1947]: I0517 00:34:04.992970 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:34:04.993365 kubelet[1947]: E0517 00:34:04.993346 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:05.011172 kubelet[1947]: E0517 00:34:05.011142 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:05.011331 kubelet[1947]: E0517 00:34:05.011142 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:05.016000 audit[3818]: NETFILTER_CFG table=filter:101 family=2 entries=21 op=nft_register_rule pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.016000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffc29b679f0 a2=0 a3=7ffc29b679dc items=0 ppid=2053 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.016000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.025997 kubelet[1947]: I0517 00:34:05.025944 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-6xzzb" podStartSLOduration=36.025925818 podStartE2EDuration="36.025925818s" podCreationTimestamp="2025-05-17 00:33:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:05.02536327 +0000 UTC m=+42.200716762" watchObservedRunningTime="2025-05-17 00:34:05.025925818 +0000 UTC m=+42.201279309" May 17 00:34:05.043000 audit[3818]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3818 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.043000 audit[3818]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc29b679f0 a2=0 a3=7ffc29b679dc items=0 ppid=2053 pid=3818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.043000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.073000 audit[3825]: NETFILTER_CFG table=filter:103 family=2 entries=20 op=nft_register_rule pid=3825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.073000 audit[3825]: SYSCALL arch=c000003e syscall=46 success=yes exit=7480 a0=3 a1=7ffec695fc30 a2=0 a3=7ffec695fc1c items=0 ppid=2053 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.080000 audit[3825]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3825 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:05.080000 audit[3825]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffec695fc30 a2=0 a3=0 items=0 ppid=2053 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.080000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:05.626197 systemd-networkd[1022]: calida34622bbab: Gained IPv6LL May 17 00:34:05.896499 env[1200]: time="2025-05-17T00:34:05.896360811Z" level=info msg="StopPodSandbox for \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\"" May 17 00:34:05.896499 env[1200]: time="2025-05-17T00:34:05.896440541Z" level=info msg="StopPodSandbox for \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\"" May 17 00:34:05.896938 env[1200]: time="2025-05-17T00:34:05.896361032Z" level=info msg="StopPodSandbox for \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\"" May 17 00:34:05.958000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.958000 audit: BPF prog-id=158 op=LOAD May 17 00:34:05.958000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe0a95a7e0 a2=98 a3=3 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.958000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:05.958000 audit: BPF prog-id=158 op=UNLOAD May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit: BPF prog-id=159 op=LOAD May 17 00:34:05.960000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0a95a5d0 a2=94 a3=54428f items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.960000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:05.960000 audit: BPF prog-id=159 op=UNLOAD May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:05.960000 audit: BPF prog-id=160 op=LOAD May 17 00:34:05.960000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0a95a600 a2=94 a3=2 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:05.960000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:05.960000 audit: BPF prog-id=160 op=UNLOAD May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.945 [INFO][3891] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.945 [INFO][3891] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" iface="eth0" netns="/var/run/netns/cni-2c37cfed-ab66-5f92-1225-df919186a8ab" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.945 [INFO][3891] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" iface="eth0" netns="/var/run/netns/cni-2c37cfed-ab66-5f92-1225-df919186a8ab" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.945 [INFO][3891] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" iface="eth0" netns="/var/run/netns/cni-2c37cfed-ab66-5f92-1225-df919186a8ab" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.945 [INFO][3891] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.945 [INFO][3891] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.980 [INFO][3920] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.980 [INFO][3920] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.981 [INFO][3920] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.991 [WARNING][3920] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:05.991 [INFO][3920] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:06.001 [INFO][3920] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:06.008495 env[1200]: 2025-05-17 00:34:06.007 [INFO][3891] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:06.010719 systemd[1]: run-netns-cni\x2d2c37cfed\x2dab66\x2d5f92\x2d1225\x2ddf919186a8ab.mount: Deactivated successfully. May 17 00:34:06.011767 env[1200]: time="2025-05-17T00:34:06.011734752Z" level=info msg="TearDown network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\" successfully" May 17 00:34:06.012583 env[1200]: time="2025-05-17T00:34:06.012564721Z" level=info msg="StopPodSandbox for \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\" returns successfully" May 17 00:34:06.013148 env[1200]: time="2025-05-17T00:34:06.013117479Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7944dd59d4-4mz58,Uid:8071938f-95b8-4459-ae41-c594e77c5047,Namespace:calico-system,Attempt:1,}" May 17 00:34:06.013486 kubelet[1947]: E0517 00:34:06.013451 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:06.036000 audit[3956]: NETFILTER_CFG table=filter:105 family=2 entries=17 op=nft_register_rule pid=3956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:06.036000 audit[3956]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc67ae5640 a2=0 a3=7ffc67ae562c items=0 ppid=2053 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:06.039000 audit[3956]: NETFILTER_CFG table=nat:106 family=2 entries=35 op=nft_register_chain pid=3956 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:06.039000 audit[3956]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc67ae5640 a2=0 a3=7ffc67ae562c items=0 ppid=2053 pid=3956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.039000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:05.967 [INFO][3892] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:05.967 [INFO][3892] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" iface="eth0" netns="/var/run/netns/cni-1f7c3a02-4fba-6ab3-0cd5-7724f1e3934a" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:05.967 [INFO][3892] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" iface="eth0" netns="/var/run/netns/cni-1f7c3a02-4fba-6ab3-0cd5-7724f1e3934a" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:05.968 [INFO][3892] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" iface="eth0" netns="/var/run/netns/cni-1f7c3a02-4fba-6ab3-0cd5-7724f1e3934a" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:05.968 [INFO][3892] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:05.968 [INFO][3892] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:06.048 [INFO][3933] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:06.048 [INFO][3933] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:06.049 [INFO][3933] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:06.058 [WARNING][3933] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:06.058 [INFO][3933] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:06.060 [INFO][3933] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:06.065294 env[1200]: 2025-05-17 00:34:06.062 [INFO][3892] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:06.069319 systemd[1]: run-netns-cni\x2d1f7c3a02\x2d4fba\x2d6ab3\x2d0cd5\x2d7724f1e3934a.mount: Deactivated successfully. May 17 00:34:06.070528 env[1200]: time="2025-05-17T00:34:06.070482185Z" level=info msg="TearDown network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\" successfully" May 17 00:34:06.070528 env[1200]: time="2025-05-17T00:34:06.070519756Z" level=info msg="StopPodSandbox for \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\" returns successfully" May 17 00:34:06.072270 env[1200]: time="2025-05-17T00:34:06.072247402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-vgvnz,Uid:fb24c1ad-1d22-43e4-8f64-d7c39476dce8,Namespace:calico-apiserver,Attempt:1,}" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.005 [INFO][3906] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.005 [INFO][3906] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" iface="eth0" netns="/var/run/netns/cni-6f89b40d-01a0-f57b-caad-176e4a533087" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.005 [INFO][3906] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" iface="eth0" netns="/var/run/netns/cni-6f89b40d-01a0-f57b-caad-176e4a533087" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.005 [INFO][3906] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" iface="eth0" netns="/var/run/netns/cni-6f89b40d-01a0-f57b-caad-176e4a533087" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.005 [INFO][3906] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.005 [INFO][3906] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.076 [INFO][3948] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.076 [INFO][3948] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.077 [INFO][3948] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.082 [WARNING][3948] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.082 [INFO][3948] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.083 [INFO][3948] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:06.090573 env[1200]: 2025-05-17 00:34:06.085 [INFO][3906] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:06.091720 env[1200]: time="2025-05-17T00:34:06.091686267Z" level=info msg="TearDown network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\" successfully" May 17 00:34:06.091802 env[1200]: time="2025-05-17T00:34:06.091781495Z" level=info msg="StopPodSandbox for \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\" returns successfully" May 17 00:34:06.093365 systemd[1]: run-netns-cni\x2d6f89b40d\x2d01a0\x2df57b\x2dcaad\x2d176e4a533087.mount: Deactivated successfully. May 17 00:34:06.099000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit: BPF prog-id=161 op=LOAD May 17 00:34:06.099000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe0a95a4c0 a2=94 a3=1 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.099000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.099000 audit: BPF prog-id=161 op=UNLOAD May 17 00:34:06.099000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.099000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe0a95a590 a2=50 a3=7ffe0a95a670 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.099000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.103968 env[1200]: time="2025-05-17T00:34:06.101595165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-mqnv5,Uid:5f48ef61-1a96-4b80-89cb-94f293d8a38e,Namespace:calico-apiserver,Attempt:1,}" May 17 00:34:06.107000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.107000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0a95a4d0 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.107000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.107000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.107000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0a95a500 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.107000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.107000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.107000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0a95a410 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.107000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.107000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.107000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0a95a520 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.107000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0a95a500 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0a95a4f0 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0a95a520 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0a95a500 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0a95a520 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe0a95a4f0 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe0a95a560 a2=28 a3=0 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe0a95a310 a2=50 a3=1 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit: BPF prog-id=162 op=LOAD May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe0a95a310 a2=94 a3=5 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit: BPF prog-id=162 op=UNLOAD May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe0a95a3c0 a2=50 a3=1 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe0a95a4e0 a2=4 a3=38 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { confidentiality } for pid=3930 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0a95a530 a2=94 a3=6 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.108000 audit[3930]: AVC avc: denied { confidentiality } for pid=3930 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:06.108000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0a959ce0 a2=94 a3=88 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.108000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.109000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { perfmon } for pid=3930 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { bpf } for pid=3930 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.109000 audit[3930]: AVC avc: denied { confidentiality } for pid=3930 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:06.109000 audit[3930]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe0a959ce0 a2=94 a3=88 items=0 ppid=3854 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.109000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit: BPF prog-id=163 op=LOAD May 17 00:34:06.124000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcfafb580 a2=98 a3=1999999999999999 items=0 ppid=3854 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.124000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:34:06.124000 audit: BPF prog-id=163 op=UNLOAD May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit: BPF prog-id=164 op=LOAD May 17 00:34:06.124000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcfafb460 a2=94 a3=ffff items=0 ppid=3854 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.124000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:34:06.124000 audit: BPF prog-id=164 op=UNLOAD May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.124000 audit: BPF prog-id=165 op=LOAD May 17 00:34:06.124000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffcfafb4a0 a2=94 a3=7fffcfafb680 items=0 ppid=3854 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.124000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 17 00:34:06.124000 audit: BPF prog-id=165 op=UNLOAD May 17 00:34:06.188119 systemd-networkd[1022]: vxlan.calico: Link UP May 17 00:34:06.188127 systemd-networkd[1022]: vxlan.calico: Gained carrier May 17 00:34:06.206421 systemd-networkd[1022]: cali115a5e89509: Link UP May 17 00:34:06.206539 systemd-networkd[1022]: cali115a5e89509: Gained carrier May 17 00:34:06.209086 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali115a5e89509: link becomes ready May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.111 [INFO][3960] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0 calico-kube-controllers-7944dd59d4- calico-system 8071938f-95b8-4459-ae41-c594e77c5047 1020 0 2025-05-17 00:33:40 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7944dd59d4 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7944dd59d4-4mz58 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali115a5e89509 [] [] }} ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.112 [INFO][3960] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.153 [INFO][3989] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" HandleID="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.153 [INFO][3989] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" HandleID="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005b2af0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7944dd59d4-4mz58", "timestamp":"2025-05-17 00:34:06.153495614 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.153 [INFO][3989] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.153 [INFO][3989] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.153 [INFO][3989] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.160 [INFO][3989] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.164 [INFO][3989] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.171 [INFO][3989] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.178 [INFO][3989] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.180 [INFO][3989] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.180 [INFO][3989] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.183 [INFO][3989] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8 May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.186 [INFO][3989] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.200 [INFO][3989] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.200 [INFO][3989] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" host="localhost" May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.200 [INFO][3989] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:06.218202 env[1200]: 2025-05-17 00:34:06.200 [INFO][3989] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" HandleID="k8s-pod-network.b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.218825 env[1200]: 2025-05-17 00:34:06.203 [INFO][3960] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0", GenerateName:"calico-kube-controllers-7944dd59d4-", Namespace:"calico-system", SelfLink:"", UID:"8071938f-95b8-4459-ae41-c594e77c5047", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7944dd59d4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7944dd59d4-4mz58", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali115a5e89509", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:06.218825 env[1200]: 2025-05-17 00:34:06.204 [INFO][3960] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.131/32] ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.218825 env[1200]: 2025-05-17 00:34:06.204 [INFO][3960] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali115a5e89509 ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.218825 env[1200]: 2025-05-17 00:34:06.205 [INFO][3960] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.218825 env[1200]: 2025-05-17 00:34:06.205 [INFO][3960] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0", GenerateName:"calico-kube-controllers-7944dd59d4-", Namespace:"calico-system", SelfLink:"", UID:"8071938f-95b8-4459-ae41-c594e77c5047", ResourceVersion:"1020", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7944dd59d4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8", Pod:"calico-kube-controllers-7944dd59d4-4mz58", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali115a5e89509", MAC:"de:10:45:ba:45:dc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:06.218825 env[1200]: 2025-05-17 00:34:06.216 [INFO][3960] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8" Namespace="calico-system" Pod="calico-kube-controllers-7944dd59d4-4mz58" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit: BPF prog-id=166 op=LOAD May 17 00:34:06.229000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb53f4020 a2=98 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.229000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.229000 audit: BPF prog-id=166 op=UNLOAD May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.229000 audit: BPF prog-id=167 op=LOAD May 17 00:34:06.229000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb53f3e30 a2=94 a3=54428f items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.229000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit: BPF prog-id=167 op=UNLOAD May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit: BPF prog-id=168 op=LOAD May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffb53f3e60 a2=94 a3=2 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit: BPF prog-id=168 op=UNLOAD May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb53f3d30 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb53f3d60 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb53f3c70 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb53f3d80 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb53f3d60 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb53f3d50 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb53f3d80 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb53f3d60 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb53f3d80 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffb53f3d50 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffb53f3dc0 a2=28 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.230000 audit: BPF prog-id=169 op=LOAD May 17 00:34:06.230000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb53f3c30 a2=94 a3=0 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.230000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.230000 audit: BPF prog-id=169 op=UNLOAD May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffb53f3c20 a2=50 a3=2800 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.231000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffb53f3c20 a2=50 a3=2800 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.231000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit: BPF prog-id=170 op=LOAD May 17 00:34:06.231000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb53f3440 a2=94 a3=2 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.231000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.231000 audit: BPF prog-id=170 op=UNLOAD May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { perfmon } for pid=4066 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit[4066]: AVC avc: denied { bpf } for pid=4066 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.231000 audit: BPF prog-id=171 op=LOAD May 17 00:34:06.231000 audit[4066]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffb53f3540 a2=94 a3=30 items=0 ppid=3854 pid=4066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.231000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit: BPF prog-id=172 op=LOAD May 17 00:34:06.234000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffeb3116cc0 a2=98 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.234000 audit: BPF prog-id=172 op=UNLOAD May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit: BPF prog-id=173 op=LOAD May 17 00:34:06.234000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb3116ab0 a2=94 a3=54428f items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.234000 audit: BPF prog-id=173 op=UNLOAD May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.234000 audit: BPF prog-id=174 op=LOAD May 17 00:34:06.234000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb3116ae0 a2=94 a3=2 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.234000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.234000 audit: BPF prog-id=174 op=UNLOAD May 17 00:34:06.247398 env[1200]: time="2025-05-17T00:34:06.247317341Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:06.247530 env[1200]: time="2025-05-17T00:34:06.247411357Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:06.247530 env[1200]: time="2025-05-17T00:34:06.247432797Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:06.250049 env[1200]: time="2025-05-17T00:34:06.247646068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8 pid=4078 runtime=io.containerd.runc.v2 May 17 00:34:06.260281 systemd[1]: Started cri-containerd-b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8.scope. May 17 00:34:06.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit: BPF prog-id=175 op=LOAD May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4078 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353462346537363933646663373362393966306466303631306633 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4078 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353462346537363933646663373362393966306466303631306633 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit: BPF prog-id=176 op=LOAD May 17 00:34:06.278000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003e89d0 items=0 ppid=4078 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353462346537363933646663373362393966306466303631306633 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit: BPF prog-id=177 op=LOAD May 17 00:34:06.278000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003e8a18 items=0 ppid=4078 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353462346537363933646663373362393966306466303631306633 May 17 00:34:06.278000 audit: BPF prog-id=177 op=UNLOAD May 17 00:34:06.278000 audit: BPF prog-id=176 op=UNLOAD May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.278000 audit: BPF prog-id=178 op=LOAD May 17 00:34:06.278000 audit[4093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e8e28 items=0 ppid=4078 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239353462346537363933646663373362393966306466303631306633 May 17 00:34:06.280605 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:06.306494 env[1200]: time="2025-05-17T00:34:06.306447053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7944dd59d4-4mz58,Uid:8071938f-95b8-4459-ae41-c594e77c5047,Namespace:calico-system,Attempt:1,} returns sandbox id \"b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8\"" May 17 00:34:06.308648 env[1200]: time="2025-05-17T00:34:06.308564421Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\"" May 17 00:34:06.347000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.347000 audit: BPF prog-id=179 op=LOAD May 17 00:34:06.347000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffeb31169a0 a2=94 a3=1 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.347000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.348000 audit: BPF prog-id=179 op=UNLOAD May 17 00:34:06.348000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.348000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffeb3116a70 a2=50 a3=7ffeb3116b50 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.348000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb31169b0 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb31169e0 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb31168f0 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb3116a00 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb31169e0 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb31169d0 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb3116a00 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb31169e0 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb3116a00 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffeb31169d0 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffeb3116a40 a2=28 a3=0 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb31167f0 a2=50 a3=1 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit: BPF prog-id=180 op=LOAD May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffeb31167f0 a2=94 a3=5 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit: BPF prog-id=180 op=UNLOAD May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffeb31168a0 a2=50 a3=1 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffeb31169c0 a2=4 a3=38 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.356000 audit[4068]: AVC avc: denied { confidentiality } for pid=4068 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:06.356000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb3116a10 a2=94 a3=6 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.356000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { confidentiality } for pid=4068 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:06.357000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb31161c0 a2=94 a3=88 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { perfmon } for pid=4068 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { confidentiality } for pid=4068 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 17 00:34:06.357000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffeb31161c0 a2=94 a3=88 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb3117bf0 a2=10 a3=208 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb3117a90 a2=10 a3=3 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb3117a30 a2=10 a3=3 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.357000 audit[4068]: AVC avc: denied { bpf } for pid=4068 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.357000 audit[4068]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffeb3117a30 a2=10 a3=7 items=0 ppid=3854 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.357000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 17 00:34:06.365000 audit: BPF prog-id=171 op=UNLOAD May 17 00:34:06.405000 audit[4139]: NETFILTER_CFG table=mangle:107 family=2 entries=16 op=nft_register_chain pid=4139 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:06.405000 audit[4139]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff42a6c4c0 a2=0 a3=7fff42a6c4ac items=0 ppid=3854 pid=4139 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.405000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:06.411000 audit[4140]: NETFILTER_CFG table=nat:108 family=2 entries=15 op=nft_register_chain pid=4140 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:06.411000 audit[4140]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd17ce48c0 a2=0 a3=7ffd17ce48ac items=0 ppid=3854 pid=4140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.411000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:06.414000 audit[4138]: NETFILTER_CFG table=raw:109 family=2 entries=21 op=nft_register_chain pid=4138 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:06.414000 audit[4138]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffe5016cc90 a2=0 a3=7ffe5016cc7c items=0 ppid=3854 pid=4138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.414000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:06.416000 audit[4143]: NETFILTER_CFG table=filter:110 family=2 entries=128 op=nft_register_chain pid=4143 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:06.416000 audit[4143]: SYSCALL arch=c000003e syscall=46 success=yes exit=72768 a0=3 a1=7ffca5c70060 a2=0 a3=7ffca5c7004c items=0 ppid=3854 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.416000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:06.441629 systemd-networkd[1022]: cali738f8e01624: Link UP May 17 00:34:06.445372 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali738f8e01624: link becomes ready May 17 00:34:06.444645 systemd-networkd[1022]: cali738f8e01624: Gained carrier May 17 00:34:06.467000 audit[4154]: NETFILTER_CFG table=filter:111 family=2 entries=40 op=nft_register_chain pid=4154 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:06.467000 audit[4154]: SYSCALL arch=c000003e syscall=46 success=yes exit=20764 a0=3 a1=7ffd711b3310 a2=0 a3=7ffd711b32fc items=0 ppid=3854 pid=4154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.467000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.184 [INFO][3976] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0 calico-apiserver-5f7f6d44f8- calico-apiserver fb24c1ad-1d22-43e4-8f64-d7c39476dce8 1021 0 2025-05-17 00:33:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f7f6d44f8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5f7f6d44f8-vgvnz eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali738f8e01624 [] [] }} ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.184 [INFO][3976] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.229 [INFO][4041] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" HandleID="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.229 [INFO][4041] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" HandleID="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000363620), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5f7f6d44f8-vgvnz", "timestamp":"2025-05-17 00:34:06.229507707 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.229 [INFO][4041] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.229 [INFO][4041] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.229 [INFO][4041] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.268 [INFO][4041] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.274 [INFO][4041] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.282 [INFO][4041] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.284 [INFO][4041] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.287 [INFO][4041] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.287 [INFO][4041] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.288 [INFO][4041] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.321 [INFO][4041] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.438 [INFO][4041] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.438 [INFO][4041] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" host="localhost" May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.438 [INFO][4041] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:06.485577 env[1200]: 2025-05-17 00:34:06.438 [INFO][4041] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" HandleID="k8s-pod-network.2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.486930 env[1200]: 2025-05-17 00:34:06.440 [INFO][3976] cni-plugin/k8s.go 418: Populated endpoint ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"fb24c1ad-1d22-43e4-8f64-d7c39476dce8", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5f7f6d44f8-vgvnz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali738f8e01624", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:06.486930 env[1200]: 2025-05-17 00:34:06.440 [INFO][3976] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.132/32] ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.486930 env[1200]: 2025-05-17 00:34:06.440 [INFO][3976] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali738f8e01624 ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.486930 env[1200]: 2025-05-17 00:34:06.441 [INFO][3976] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.486930 env[1200]: 2025-05-17 00:34:06.442 [INFO][3976] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"fb24c1ad-1d22-43e4-8f64-d7c39476dce8", ResourceVersion:"1021", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e", Pod:"calico-apiserver-5f7f6d44f8-vgvnz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali738f8e01624", MAC:"d6:8d:dc:d8:e0:0b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:06.486930 env[1200]: 2025-05-17 00:34:06.483 [INFO][3976] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-vgvnz" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:06.530132 env[1200]: time="2025-05-17T00:34:06.530054841Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:06.530132 env[1200]: time="2025-05-17T00:34:06.530106509Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:06.530132 env[1200]: time="2025-05-17T00:34:06.530117129Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:06.530363 env[1200]: time="2025-05-17T00:34:06.530319088Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e pid=4168 runtime=io.containerd.runc.v2 May 17 00:34:06.539749 systemd[1]: Started cri-containerd-2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e.scope. May 17 00:34:06.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.548000 audit: BPF prog-id=181 op=LOAD May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343562373032633031626665393139383538303965363366323963 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343562373032633031626665393139383538303965363366323963 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit: BPF prog-id=182 op=LOAD May 17 00:34:06.549000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000dfce0 items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343562373032633031626665393139383538303965363366323963 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit: BPF prog-id=183 op=LOAD May 17 00:34:06.549000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000dfd28 items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343562373032633031626665393139383538303965363366323963 May 17 00:34:06.549000 audit: BPF prog-id=183 op=UNLOAD May 17 00:34:06.549000 audit: BPF prog-id=182 op=UNLOAD May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { perfmon } for pid=4177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit[4177]: AVC avc: denied { bpf } for pid=4177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.549000 audit: BPF prog-id=184 op=LOAD May 17 00:34:06.549000 audit[4177]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e2138 items=0 ppid=4168 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343562373032633031626665393139383538303965363366323963 May 17 00:34:06.551501 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:06.576171 env[1200]: time="2025-05-17T00:34:06.576130555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-vgvnz,Uid:fb24c1ad-1d22-43e4-8f64-d7c39476dce8,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e\"" May 17 00:34:06.577000 audit[4204]: NETFILTER_CFG table=filter:112 family=2 entries=58 op=nft_register_chain pid=4204 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:06.577000 audit[4204]: SYSCALL arch=c000003e syscall=46 success=yes exit=30584 a0=3 a1=7ffc05a32360 a2=0 a3=7ffc05a3234c items=0 ppid=3854 pid=4204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.577000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:06.581913 systemd-networkd[1022]: cali9f08b23d8cd: Link UP May 17 00:34:06.583691 systemd-networkd[1022]: cali9f08b23d8cd: Gained carrier May 17 00:34:06.584047 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9f08b23d8cd: link becomes ready May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.153 [INFO][3999] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0 calico-apiserver-5f7f6d44f8- calico-apiserver 5f48ef61-1a96-4b80-89cb-94f293d8a38e 1022 0 2025-05-17 00:33:37 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5f7f6d44f8 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5f7f6d44f8-mqnv5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9f08b23d8cd [] [] }} ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.153 [INFO][3999] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.234 [INFO][4030] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" HandleID="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.234 [INFO][4030] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" HandleID="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000123b90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5f7f6d44f8-mqnv5", "timestamp":"2025-05-17 00:34:06.23450668 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.234 [INFO][4030] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.438 [INFO][4030] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.438 [INFO][4030] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.446 [INFO][4030] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.456 [INFO][4030] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.487 [INFO][4030] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.488 [INFO][4030] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.490 [INFO][4030] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.490 [INFO][4030] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.491 [INFO][4030] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.497 [INFO][4030] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.575 [INFO][4030] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.576 [INFO][4030] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" host="localhost" May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.576 [INFO][4030] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:06.743336 env[1200]: 2025-05-17 00:34:06.576 [INFO][4030] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" HandleID="k8s-pod-network.b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.744175 env[1200]: 2025-05-17 00:34:06.579 [INFO][3999] cni-plugin/k8s.go 418: Populated endpoint ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f48ef61-1a96-4b80-89cb-94f293d8a38e", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5f7f6d44f8-mqnv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9f08b23d8cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:06.744175 env[1200]: 2025-05-17 00:34:06.580 [INFO][3999] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.133/32] ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.744175 env[1200]: 2025-05-17 00:34:06.580 [INFO][3999] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali9f08b23d8cd ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.744175 env[1200]: 2025-05-17 00:34:06.583 [INFO][3999] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.744175 env[1200]: 2025-05-17 00:34:06.584 [INFO][3999] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f48ef61-1a96-4b80-89cb-94f293d8a38e", ResourceVersion:"1022", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb", Pod:"calico-apiserver-5f7f6d44f8-mqnv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9f08b23d8cd", MAC:"22:a4:5c:4b:b9:18", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:06.744175 env[1200]: 2025-05-17 00:34:06.741 [INFO][3999] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb" Namespace="calico-apiserver" Pod="calico-apiserver-5f7f6d44f8-mqnv5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:06.775000 audit[4215]: NETFILTER_CFG table=filter:113 family=2 entries=49 op=nft_register_chain pid=4215 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:06.775000 audit[4215]: SYSCALL arch=c000003e syscall=46 success=yes exit=25452 a0=3 a1=7ffc5b63d5c0 a2=0 a3=7ffc5b63d5ac items=0 ppid=3854 pid=4215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.775000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:06.782788 env[1200]: time="2025-05-17T00:34:06.782715459Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:06.782788 env[1200]: time="2025-05-17T00:34:06.782759061Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:06.782918 env[1200]: time="2025-05-17T00:34:06.782789017Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:06.783065 env[1200]: time="2025-05-17T00:34:06.783009983Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb pid=4223 runtime=io.containerd.runc.v2 May 17 00:34:06.793323 systemd[1]: Started cri-containerd-b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb.scope. May 17 00:34:06.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit: BPF prog-id=185 op=LOAD May 17 00:34:06.802000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4223 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623634333533623166346333383163363166666637363535336239 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4223 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623634333533623166346333383163363166666637363535336239 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.802000 audit: BPF prog-id=186 op=LOAD May 17 00:34:06.802000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002ff5b0 items=0 ppid=4223 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623634333533623166346333383163363166666637363535336239 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit: BPF prog-id=187 op=LOAD May 17 00:34:06.803000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002ff5f8 items=0 ppid=4223 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623634333533623166346333383163363166666637363535336239 May 17 00:34:06.803000 audit: BPF prog-id=187 op=UNLOAD May 17 00:34:06.803000 audit: BPF prog-id=186 op=UNLOAD May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { perfmon } for pid=4233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit[4233]: AVC avc: denied { bpf } for pid=4233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:06.803000 audit: BPF prog-id=188 op=LOAD May 17 00:34:06.803000 audit[4233]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002ffa08 items=0 ppid=4223 pid=4233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:06.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623634333533623166346333383163363166666637363535336239 May 17 00:34:06.805549 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:06.825559 env[1200]: time="2025-05-17T00:34:06.825497595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5f7f6d44f8-mqnv5,Uid:5f48ef61-1a96-4b80-89cb-94f293d8a38e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb\"" May 17 00:34:06.896316 env[1200]: time="2025-05-17T00:34:06.896280322Z" level=info msg="StopPodSandbox for \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\"" May 17 00:34:06.896503 env[1200]: time="2025-05-17T00:34:06.896322030Z" level=info msg="StopPodSandbox for \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\"" May 17 00:34:06.897356 env[1200]: time="2025-05-17T00:34:06.896439411Z" level=info msg="StopPodSandbox for \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\"" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.950 [INFO][4289] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.950 [INFO][4289] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" iface="eth0" netns="/var/run/netns/cni-81eccd51-73f3-95d3-fc27-2c7714659c58" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.950 [INFO][4289] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" iface="eth0" netns="/var/run/netns/cni-81eccd51-73f3-95d3-fc27-2c7714659c58" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.950 [INFO][4289] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" iface="eth0" netns="/var/run/netns/cni-81eccd51-73f3-95d3-fc27-2c7714659c58" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.950 [INFO][4289] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.950 [INFO][4289] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.978 [INFO][4321] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.978 [INFO][4321] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.978 [INFO][4321] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.986 [WARNING][4321] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.986 [INFO][4321] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.988 [INFO][4321] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:06.995941 env[1200]: 2025-05-17 00:34:06.993 [INFO][4289] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:06.996573 env[1200]: time="2025-05-17T00:34:06.996017364Z" level=info msg="TearDown network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\" successfully" May 17 00:34:06.996573 env[1200]: time="2025-05-17T00:34:06.996094539Z" level=info msg="StopPodSandbox for \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\" returns successfully" May 17 00:34:06.997500 env[1200]: time="2025-05-17T00:34:06.997458611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vkxng,Uid:b65ec255-9954-44f6-8517-cb2caadf1655,Namespace:calico-system,Attempt:1,}" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.950 [INFO][4287] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.950 [INFO][4287] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" iface="eth0" netns="/var/run/netns/cni-918d162c-ea37-6a06-1841-dcf866e895b8" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.951 [INFO][4287] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" iface="eth0" netns="/var/run/netns/cni-918d162c-ea37-6a06-1841-dcf866e895b8" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.951 [INFO][4287] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" iface="eth0" netns="/var/run/netns/cni-918d162c-ea37-6a06-1841-dcf866e895b8" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.951 [INFO][4287] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.951 [INFO][4287] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.987 [INFO][4316] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.987 [INFO][4316] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.988 [INFO][4316] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.993 [WARNING][4316] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.993 [INFO][4316] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:06.994 [INFO][4316] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:07.001519 env[1200]: 2025-05-17 00:34:07.000 [INFO][4287] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:07.001996 env[1200]: time="2025-05-17T00:34:07.001644066Z" level=info msg="TearDown network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\" successfully" May 17 00:34:07.001996 env[1200]: time="2025-05-17T00:34:07.001674804Z" level=info msg="StopPodSandbox for \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\" returns successfully" May 17 00:34:07.002086 kubelet[1947]: E0517 00:34:07.002054 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:07.002508 env[1200]: time="2025-05-17T00:34:07.002468565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-qqxfp,Uid:ea10e578-7af0-4b41-a269-d133b5ba1bd6,Namespace:kube-system,Attempt:1,}" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.949 [INFO][4288] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.949 [INFO][4288] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" iface="eth0" netns="/var/run/netns/cni-6d8c1e84-1f04-aea3-cf49-7ddc56d9d9db" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.949 [INFO][4288] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" iface="eth0" netns="/var/run/netns/cni-6d8c1e84-1f04-aea3-cf49-7ddc56d9d9db" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.949 [INFO][4288] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" iface="eth0" netns="/var/run/netns/cni-6d8c1e84-1f04-aea3-cf49-7ddc56d9d9db" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.949 [INFO][4288] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.949 [INFO][4288] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.998 [INFO][4313] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.998 [INFO][4313] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:06.998 [INFO][4313] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:07.005 [WARNING][4313] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:07.005 [INFO][4313] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:07.007 [INFO][4313] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:07.011089 env[1200]: 2025-05-17 00:34:07.009 [INFO][4288] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:07.011630 env[1200]: time="2025-05-17T00:34:07.011602024Z" level=info msg="TearDown network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\" successfully" May 17 00:34:07.011903 env[1200]: time="2025-05-17T00:34:07.011881780Z" level=info msg="StopPodSandbox for \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\" returns successfully" May 17 00:34:07.012576 env[1200]: time="2025-05-17T00:34:07.012554535Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-8c4cx,Uid:01f33b6b-253c-4c1e-93af-24789a3c3b42,Namespace:calico-system,Attempt:1,}" May 17 00:34:07.017977 kubelet[1947]: E0517 00:34:07.017941 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:07.045790 systemd[1]: run-netns-cni\x2d81eccd51\x2d73f3\x2d95d3\x2dfc27\x2d2c7714659c58.mount: Deactivated successfully. May 17 00:34:07.045859 systemd[1]: run-netns-cni\x2d6d8c1e84\x2d1f04\x2daea3\x2dcf49\x2d7ddc56d9d9db.mount: Deactivated successfully. May 17 00:34:07.045901 systemd[1]: run-netns-cni\x2d918d162c\x2dea37\x2d6a06\x2d1841\x2ddcf866e895b8.mount: Deactivated successfully. May 17 00:34:07.119764 systemd-networkd[1022]: cali24b6ffb79f7: Link UP May 17 00:34:07.122365 systemd-networkd[1022]: cali24b6ffb79f7: Gained carrier May 17 00:34:07.123188 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali24b6ffb79f7: link becomes ready May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.050 [INFO][4337] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--vkxng-eth0 csi-node-driver- calico-system b65ec255-9954-44f6-8517-cb2caadf1655 1052 0 2025-05-17 00:33:40 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:68bf44dd5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-vkxng eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali24b6ffb79f7 [] [] }} ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.050 [INFO][4337] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.075 [INFO][4378] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" HandleID="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.075 [INFO][4378] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" HandleID="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0001b3780), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-vkxng", "timestamp":"2025-05-17 00:34:07.075818274 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.076 [INFO][4378] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.076 [INFO][4378] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.076 [INFO][4378] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.082 [INFO][4378] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.090 [INFO][4378] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.096 [INFO][4378] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.098 [INFO][4378] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.100 [INFO][4378] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.100 [INFO][4378] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.101 [INFO][4378] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.108 [INFO][4378] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.114 [INFO][4378] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.115 [INFO][4378] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" host="localhost" May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.115 [INFO][4378] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:07.136108 env[1200]: 2025-05-17 00:34:07.115 [INFO][4378] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" HandleID="k8s-pod-network.6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:07.136693 env[1200]: 2025-05-17 00:34:07.117 [INFO][4337] cni-plugin/k8s.go 418: Populated endpoint ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vkxng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b65ec255-9954-44f6-8517-cb2caadf1655", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-vkxng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali24b6ffb79f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:07.136693 env[1200]: 2025-05-17 00:34:07.117 [INFO][4337] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.134/32] ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:07.136693 env[1200]: 2025-05-17 00:34:07.117 [INFO][4337] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali24b6ffb79f7 ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:07.136693 env[1200]: 2025-05-17 00:34:07.123 [INFO][4337] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:07.136693 env[1200]: 2025-05-17 00:34:07.123 [INFO][4337] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vkxng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b65ec255-9954-44f6-8517-cb2caadf1655", ResourceVersion:"1052", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e", Pod:"csi-node-driver-vkxng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali24b6ffb79f7", MAC:"8e:68:d4:9a:a7:8c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:07.136693 env[1200]: 2025-05-17 00:34:07.133 [INFO][4337] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e" Namespace="calico-system" Pod="csi-node-driver-vkxng" WorkloadEndpoint="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:07.143000 audit[4421]: NETFILTER_CFG table=filter:114 family=2 entries=58 op=nft_register_chain pid=4421 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:07.143000 audit[4421]: SYSCALL arch=c000003e syscall=46 success=yes exit=27180 a0=3 a1=7ffcec6cf420 a2=0 a3=7ffcec6cf40c items=0 ppid=3854 pid=4421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.143000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:07.145033 env[1200]: time="2025-05-17T00:34:07.144955799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:07.145033 env[1200]: time="2025-05-17T00:34:07.144999902Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:07.145033 env[1200]: time="2025-05-17T00:34:07.145010091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:07.145209 env[1200]: time="2025-05-17T00:34:07.145155224Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e pid=4422 runtime=io.containerd.runc.v2 May 17 00:34:07.159791 systemd[1]: Started cri-containerd-6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e.scope. May 17 00:34:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.168000 audit: BPF prog-id=189 op=LOAD May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4422 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666138646463393934363961656335616133383566373261323038 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4422 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666138646463393934363961656335616133383566373261323038 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit: BPF prog-id=190 op=LOAD May 17 00:34:07.169000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000328df0 items=0 ppid=4422 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666138646463393934363961656335616133383566373261323038 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit: BPF prog-id=191 op=LOAD May 17 00:34:07.169000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000328e38 items=0 ppid=4422 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666138646463393934363961656335616133383566373261323038 May 17 00:34:07.169000 audit: BPF prog-id=191 op=UNLOAD May 17 00:34:07.169000 audit: BPF prog-id=190 op=UNLOAD May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { perfmon } for pid=4433 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit[4433]: AVC avc: denied { bpf } for pid=4433 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.169000 audit: BPF prog-id=192 op=LOAD May 17 00:34:07.169000 audit[4433]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000329248 items=0 ppid=4422 pid=4433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662666138646463393934363961656335616133383566373261323038 May 17 00:34:07.170928 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:07.178913 env[1200]: time="2025-05-17T00:34:07.178783745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-vkxng,Uid:b65ec255-9954-44f6-8517-cb2caadf1655,Namespace:calico-system,Attempt:1,} returns sandbox id \"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e\"" May 17 00:34:07.210545 systemd-networkd[1022]: cali79eb666be61: Link UP May 17 00:34:07.212787 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 17 00:34:07.212830 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali79eb666be61: link becomes ready May 17 00:34:07.212949 systemd-networkd[1022]: cali79eb666be61: Gained carrier May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.099 [INFO][4350] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0 coredns-7c65d6cfc9- kube-system ea10e578-7af0-4b41-a269-d133b5ba1bd6 1051 0 2025-05-17 00:33:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7c65d6cfc9 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7c65d6cfc9-qqxfp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali79eb666be61 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] [] }} ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.099 [INFO][4350] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.128 [INFO][4398] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" HandleID="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.129 [INFO][4398] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" HandleID="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000235620), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7c65d6cfc9-qqxfp", "timestamp":"2025-05-17 00:34:07.128837656 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.129 [INFO][4398] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.129 [INFO][4398] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.129 [INFO][4398] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.183 [INFO][4398] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.190 [INFO][4398] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.193 [INFO][4398] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.194 [INFO][4398] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.196 [INFO][4398] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.196 [INFO][4398] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.197 [INFO][4398] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882 May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.200 [INFO][4398] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.205 [INFO][4398] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.135/26] block=192.168.88.128/26 handle="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.205 [INFO][4398] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.135/26] handle="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" host="localhost" May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.207 [INFO][4398] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:07.221695 env[1200]: 2025-05-17 00:34:07.207 [INFO][4398] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.135/26] IPv6=[] ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" HandleID="k8s-pod-network.bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.222370 env[1200]: 2025-05-17 00:34:07.209 [INFO][4350] cni-plugin/k8s.go 418: Populated endpoint ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"ea10e578-7af0-4b41-a269-d133b5ba1bd6", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7c65d6cfc9-qqxfp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79eb666be61", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:07.222370 env[1200]: 2025-05-17 00:34:07.209 [INFO][4350] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.135/32] ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.222370 env[1200]: 2025-05-17 00:34:07.209 [INFO][4350] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali79eb666be61 ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.222370 env[1200]: 2025-05-17 00:34:07.212 [INFO][4350] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.222370 env[1200]: 2025-05-17 00:34:07.213 [INFO][4350] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"ea10e578-7af0-4b41-a269-d133b5ba1bd6", ResourceVersion:"1051", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882", Pod:"coredns-7c65d6cfc9-qqxfp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79eb666be61", MAC:"f6:b9:92:7b:4d:f2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:07.222370 env[1200]: 2025-05-17 00:34:07.220 [INFO][4350] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882" Namespace="kube-system" Pod="coredns-7c65d6cfc9-qqxfp" WorkloadEndpoint="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:07.227166 systemd-networkd[1022]: vxlan.calico: Gained IPv6LL May 17 00:34:07.232610 env[1200]: time="2025-05-17T00:34:07.232543528Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:07.232771 env[1200]: time="2025-05-17T00:34:07.232590698Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:07.232771 env[1200]: time="2025-05-17T00:34:07.232603121Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:07.232771 env[1200]: time="2025-05-17T00:34:07.232730480Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882 pid=4470 runtime=io.containerd.runc.v2 May 17 00:34:07.237000 audit[4475]: NETFILTER_CFG table=filter:115 family=2 entries=54 op=nft_register_chain pid=4475 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:07.237000 audit[4475]: SYSCALL arch=c000003e syscall=46 success=yes exit=25556 a0=3 a1=7ffc764dcbe0 a2=0 a3=7ffc764dcbcc items=0 ppid=3854 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:07.252766 systemd[1]: Started cri-containerd-bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882.scope. May 17 00:34:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit: BPF prog-id=193 op=LOAD May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4470 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363330346333383032333732383134666238643133633831303631 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4470 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363330346333383032333732383134666238643133633831303631 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit: BPF prog-id=194 op=LOAD May 17 00:34:07.263000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00033b0e0 items=0 ppid=4470 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363330346333383032333732383134666238643133633831303631 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.263000 audit: BPF prog-id=195 op=LOAD May 17 00:34:07.263000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00033b128 items=0 ppid=4470 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363330346333383032333732383134666238643133633831303631 May 17 00:34:07.264000 audit: BPF prog-id=195 op=UNLOAD May 17 00:34:07.264000 audit: BPF prog-id=194 op=UNLOAD May 17 00:34:07.264000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { perfmon } for pid=4481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit[4481]: AVC avc: denied { bpf } for pid=4481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.264000 audit: BPF prog-id=196 op=LOAD May 17 00:34:07.264000 audit[4481]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033b538 items=0 ppid=4470 pid=4481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264363330346333383032333732383134666238643133633831303631 May 17 00:34:07.265740 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:07.288257 env[1200]: time="2025-05-17T00:34:07.288220485Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7c65d6cfc9-qqxfp,Uid:ea10e578-7af0-4b41-a269-d133b5ba1bd6,Namespace:kube-system,Attempt:1,} returns sandbox id \"bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882\"" May 17 00:34:07.289598 kubelet[1947]: E0517 00:34:07.289155 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:07.294610 env[1200]: time="2025-05-17T00:34:07.294577969Z" level=info msg="CreateContainer within sandbox \"bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 17 00:34:07.312815 env[1200]: time="2025-05-17T00:34:07.311093558Z" level=info msg="CreateContainer within sandbox \"bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"369c9d37d20d626968b08a1e4cad7f15c04d4a57596f570d93df45582a60e276\"" May 17 00:34:07.312815 env[1200]: time="2025-05-17T00:34:07.311913479Z" level=info msg="StartContainer for \"369c9d37d20d626968b08a1e4cad7f15c04d4a57596f570d93df45582a60e276\"" May 17 00:34:07.316440 systemd-networkd[1022]: cali91ea4c0e851: Link UP May 17 00:34:07.317549 systemd-networkd[1022]: cali91ea4c0e851: Gained carrier May 17 00:34:07.318111 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali91ea4c0e851: link becomes ready May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.095 [INFO][4352] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0 goldmane-8f77d7b6c- calico-system 01f33b6b-253c-4c1e-93af-24789a3c3b42 1050 0 2025-05-17 00:33:39 +0000 UTC map[app.kubernetes.io/name:goldmane k8s-app:goldmane pod-template-hash:8f77d7b6c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:goldmane] map[] [] [] []} {k8s localhost goldmane-8f77d7b6c-8c4cx eth0 goldmane [] [] [kns.calico-system ksa.calico-system.goldmane] cali91ea4c0e851 [] [] }} ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.095 [INFO][4352] cni-plugin/k8s.go 74: Extracted identifiers for CmdAddK8s ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.138 [INFO][4390] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" HandleID="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.138 [INFO][4390] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" HandleID="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000131770), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"goldmane-8f77d7b6c-8c4cx", "timestamp":"2025-05-17 00:34:07.138257645 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.138 [INFO][4390] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.205 [INFO][4390] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.205 [INFO][4390] ipam/ipam.go 110: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.284 [INFO][4390] ipam/ipam.go 691: Looking up existing affinities for host handle="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.291 [INFO][4390] ipam/ipam.go 394: Looking up existing affinities for host host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.296 [INFO][4390] ipam/ipam.go 511: Trying affinity for 192.168.88.128/26 host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.297 [INFO][4390] ipam/ipam.go 158: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.300 [INFO][4390] ipam/ipam.go 235: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.300 [INFO][4390] ipam/ipam.go 1220: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.301 [INFO][4390] ipam/ipam.go 1764: Creating new handle: k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9 May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.305 [INFO][4390] ipam/ipam.go 1243: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.312 [INFO][4390] ipam/ipam.go 1256: Successfully claimed IPs: [192.168.88.136/26] block=192.168.88.128/26 handle="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.312 [INFO][4390] ipam/ipam.go 878: Auto-assigned 1 out of 1 IPv4s: [192.168.88.136/26] handle="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" host="localhost" May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.312 [INFO][4390] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:07.331019 env[1200]: 2025-05-17 00:34:07.312 [INFO][4390] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.136/26] IPv6=[] ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" HandleID="k8s-pod-network.aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.331602 env[1200]: 2025-05-17 00:34:07.315 [INFO][4352] cni-plugin/k8s.go 418: Populated endpoint ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"01f33b6b-253c-4c1e-93af-24789a3c3b42", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"goldmane-8f77d7b6c-8c4cx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali91ea4c0e851", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:07.331602 env[1200]: 2025-05-17 00:34:07.315 [INFO][4352] cni-plugin/k8s.go 419: Calico CNI using IPs: [192.168.88.136/32] ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.331602 env[1200]: 2025-05-17 00:34:07.315 [INFO][4352] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali91ea4c0e851 ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.331602 env[1200]: 2025-05-17 00:34:07.317 [INFO][4352] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.331602 env[1200]: 2025-05-17 00:34:07.318 [INFO][4352] cni-plugin/k8s.go 446: Added Mac, interface name, and active container ID to endpoint ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"01f33b6b-253c-4c1e-93af-24789a3c3b42", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9", Pod:"goldmane-8f77d7b6c-8c4cx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali91ea4c0e851", MAC:"c6:cc:f7:76:c1:12", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:07.331602 env[1200]: 2025-05-17 00:34:07.329 [INFO][4352] cni-plugin/k8s.go 532: Wrote updated endpoint to datastore ContainerID="aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9" Namespace="calico-system" Pod="goldmane-8f77d7b6c-8c4cx" WorkloadEndpoint="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:07.337282 systemd[1]: Started cri-containerd-369c9d37d20d626968b08a1e4cad7f15c04d4a57596f570d93df45582a60e276.scope. May 17 00:34:07.345103 env[1200]: time="2025-05-17T00:34:07.344934899Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 17 00:34:07.345103 env[1200]: time="2025-05-17T00:34:07.345005451Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 17 00:34:07.345103 env[1200]: time="2025-05-17T00:34:07.345053502Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 17 00:34:07.346084 env[1200]: time="2025-05-17T00:34:07.345996414Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9 pid=4545 runtime=io.containerd.runc.v2 May 17 00:34:07.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit: BPF prog-id=197 op=LOAD May 17 00:34:07.346000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4470 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396339643337643230643632363936386230386131653463616437 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4470 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396339643337643230643632363936386230386131653463616437 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.346000 audit: BPF prog-id=198 op=LOAD May 17 00:34:07.346000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b5340 items=0 ppid=4470 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396339643337643230643632363936386230386131653463616437 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit: BPF prog-id=199 op=LOAD May 17 00:34:07.347000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b5388 items=0 ppid=4470 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396339643337643230643632363936386230386131653463616437 May 17 00:34:07.347000 audit: BPF prog-id=199 op=UNLOAD May 17 00:34:07.347000 audit: BPF prog-id=198 op=UNLOAD May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { perfmon } for pid=4513 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit[4513]: AVC avc: denied { bpf } for pid=4513 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.347000 audit: BPF prog-id=200 op=LOAD May 17 00:34:07.347000 audit[4513]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b5798 items=0 ppid=4470 pid=4513 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.347000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336396339643337643230643632363936386230386131653463616437 May 17 00:34:07.358341 systemd[1]: Started cri-containerd-aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9.scope. May 17 00:34:07.363287 env[1200]: time="2025-05-17T00:34:07.363255640Z" level=info msg="StartContainer for \"369c9d37d20d626968b08a1e4cad7f15c04d4a57596f570d93df45582a60e276\" returns successfully" May 17 00:34:07.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.372000 audit: BPF prog-id=201 op=LOAD May 17 00:34:07.372000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.372000 audit[4555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4545 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653161353330396164393230353631626535633562343161623066 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4545 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653161353330396164393230353631626535633562343161623066 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit: BPF prog-id=202 op=LOAD May 17 00:34:07.373000 audit[4555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028e580 items=0 ppid=4545 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653161353330396164393230353631626535633562343161623066 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.373000 audit: BPF prog-id=203 op=LOAD May 17 00:34:07.373000 audit[4555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028e5c8 items=0 ppid=4545 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653161353330396164393230353631626535633562343161623066 May 17 00:34:07.374000 audit: BPF prog-id=203 op=UNLOAD May 17 00:34:07.374000 audit: BPF prog-id=202 op=UNLOAD May 17 00:34:07.374000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { perfmon } for pid=4555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit[4555]: AVC avc: denied { bpf } for pid=4555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:07.374000 audit: BPF prog-id=204 op=LOAD May 17 00:34:07.374000 audit[4555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028e9d8 items=0 ppid=4545 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653161353330396164393230353631626535633562343161623066 May 17 00:34:07.375000 audit[4532]: AVC avc: denied { getattr } for pid=4532 comm="coredns" path="cgroup:[4026532491]" dev="nsfs" ino=4026532491 scontext=system_u:system_r:svirt_lxc_net_t:s0:c195,c455 tcontext=system_u:object_r:nsfs_t:s0 tclass=file permissive=0 May 17 00:34:07.375000 audit[4532]: SYSCALL arch=c000003e syscall=262 success=no exit=-13 a0=ffffffffffffff9c a1=c00011cb70 a2=c000534858 a3=0 items=0 ppid=4470 pid=4532 auid=4294967295 uid=65532 gid=65532 euid=65532 suid=65532 fsuid=65532 egid=65532 sgid=65532 fsgid=65532 tty=(none) ses=4294967295 comm="coredns" exe="/coredns" subj=system_u:system_r:svirt_lxc_net_t:s0:c195,c455 key=(null) May 17 00:34:07.375000 audit: PROCTITLE proctitle=2F636F7265646E73002D636F6E66002F6574632F636F7265646E732F436F726566696C65 May 17 00:34:07.376713 systemd-resolved[1141]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 17 00:34:07.400725 env[1200]: time="2025-05-17T00:34:07.400687006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:goldmane-8f77d7b6c-8c4cx,Uid:01f33b6b-253c-4c1e-93af-24789a3c3b42,Namespace:calico-system,Attempt:1,} returns sandbox id \"aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9\"" May 17 00:34:07.426000 audit[4598]: NETFILTER_CFG table=filter:116 family=2 entries=66 op=nft_register_chain pid=4598 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 17 00:34:07.426000 audit[4598]: SYSCALL arch=c000003e syscall=46 success=yes exit=32752 a0=3 a1=7fff2be6ac00 a2=0 a3=7fff2be6abec items=0 ppid=3854 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:07.426000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 17 00:34:07.930261 systemd-networkd[1022]: cali738f8e01624: Gained IPv6LL May 17 00:34:07.994133 systemd-networkd[1022]: cali9f08b23d8cd: Gained IPv6LL May 17 00:34:08.023006 kubelet[1947]: E0517 00:34:08.022983 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:08.023299 kubelet[1947]: E0517 00:34:08.023075 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:08.186226 systemd-networkd[1022]: cali115a5e89509: Gained IPv6LL May 17 00:34:08.220000 audit[4600]: NETFILTER_CFG table=filter:117 family=2 entries=14 op=nft_register_rule pid=4600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:08.220000 audit[4600]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffd5c350e00 a2=0 a3=7ffd5c350dec items=0 ppid=2053 pid=4600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:08.226000 audit[4600]: NETFILTER_CFG table=nat:118 family=2 entries=44 op=nft_register_rule pid=4600 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:08.226000 audit[4600]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd5c350e00 a2=0 a3=7ffd5c350dec items=0 ppid=2053 pid=4600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:08.805630 kernel: kauditd_printk_skb: 1042 callbacks suppressed May 17 00:34:08.805744 kernel: audit: type=1130 audit(1747442048.799:1351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.99:22-10.0.0.1:40688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.99:22-10.0.0.1:40688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:08.800110 systemd[1]: Started sshd@9-10.0.0.99:22-10.0.0.1:40688.service. May 17 00:34:08.826549 systemd-networkd[1022]: cali79eb666be61: Gained IPv6LL May 17 00:34:08.843000 audit[4602]: USER_ACCT pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.844799 sshd[4602]: Accepted publickey for core from 10.0.0.1 port 40688 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:08.847000 audit[4602]: CRED_ACQ pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.849317 sshd[4602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:08.854751 kernel: audit: type=1101 audit(1747442048.843:1352): pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.854868 kernel: audit: type=1103 audit(1747442048.847:1353): pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.854897 kernel: audit: type=1006 audit(1747442048.847:1354): pid=4602 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 17 00:34:08.853275 systemd-logind[1188]: New session 10 of user core. May 17 00:34:08.853758 systemd[1]: Started session-10.scope. May 17 00:34:08.847000 audit[4602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5c2740b0 a2=3 a3=0 items=0 ppid=1 pid=4602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.847000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:08.861238 kernel: audit: type=1300 audit(1747442048.847:1354): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5c2740b0 a2=3 a3=0 items=0 ppid=1 pid=4602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:08.861301 kernel: audit: type=1327 audit(1747442048.847:1354): proctitle=737368643A20636F7265205B707269765D May 17 00:34:08.857000 audit[4602]: USER_START pid=4602 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.865620 kernel: audit: type=1105 audit(1747442048.857:1355): pid=4602 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.869543 kernel: audit: type=1103 audit(1747442048.858:1356): pid=4604 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.858000 audit[4604]: CRED_ACQ pid=4604 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.954317 systemd-networkd[1022]: cali24b6ffb79f7: Gained IPv6LL May 17 00:34:08.990758 sshd[4602]: pam_unix(sshd:session): session closed for user core May 17 00:34:08.996051 kernel: audit: type=1106 audit(1747442048.990:1357): pid=4602 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.990000 audit[4602]: USER_END pid=4602 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.993194 systemd[1]: sshd@9-10.0.0.99:22-10.0.0.1:40688.service: Deactivated successfully. May 17 00:34:08.993879 systemd[1]: session-10.scope: Deactivated successfully. May 17 00:34:08.994375 systemd-logind[1188]: Session 10 logged out. Waiting for processes to exit. May 17 00:34:08.995044 systemd-logind[1188]: Removed session 10. May 17 00:34:08.990000 audit[4602]: CRED_DISP pid=4602 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:08.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.99:22-10.0.0.1:40688 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:09.000078 kernel: audit: type=1104 audit(1747442048.990:1358): pid=4602 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:09.025530 kubelet[1947]: E0517 00:34:09.025401 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:09.037941 kubelet[1947]: I0517 00:34:09.037532 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7c65d6cfc9-qqxfp" podStartSLOduration=40.03751295 podStartE2EDuration="40.03751295s" podCreationTimestamp="2025-05-17 00:33:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-17 00:34:08.166269986 +0000 UTC m=+45.341623477" watchObservedRunningTime="2025-05-17 00:34:09.03751295 +0000 UTC m=+46.212866441" May 17 00:34:09.051000 audit[4616]: NETFILTER_CFG table=filter:119 family=2 entries=14 op=nft_register_rule pid=4616 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:09.051000 audit[4616]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe965ed620 a2=0 a3=7ffe965ed60c items=0 ppid=2053 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:09.077000 audit[4616]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4616 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:09.077000 audit[4616]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffe965ed620 a2=0 a3=7ffe965ed60c items=0 ppid=2053 pid=4616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.077000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:09.274262 systemd-networkd[1022]: cali91ea4c0e851: Gained IPv6LL May 17 00:34:09.369019 env[1200]: time="2025-05-17T00:34:09.368958794Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:09.371086 env[1200]: time="2025-05-17T00:34:09.371018733Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:09.372676 env[1200]: time="2025-05-17T00:34:09.372634398Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:09.374116 env[1200]: time="2025-05-17T00:34:09.374084973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:eb5bc5c9e7a71f1d8ea69bbcc8e54b84fb7ec1e32d919c8b148f80b770f20182,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:09.374524 env[1200]: time="2025-05-17T00:34:09.374490064Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.30.0\" returns image reference \"sha256:094053209304a3d20e6561c18d37ac2dc4c7fbb68c1579d9864c303edebffa50\"" May 17 00:34:09.375671 env[1200]: time="2025-05-17T00:34:09.375634475Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:34:09.381650 env[1200]: time="2025-05-17T00:34:09.381618235Z" level=info msg="CreateContainer within sandbox \"b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 17 00:34:09.397933 env[1200]: time="2025-05-17T00:34:09.397900060Z" level=info msg="CreateContainer within sandbox \"b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"0c539edb76188690c1a9149789afadf1097c222228b22f3b86bb203636d4c355\"" May 17 00:34:09.398498 env[1200]: time="2025-05-17T00:34:09.398461415Z" level=info msg="StartContainer for \"0c539edb76188690c1a9149789afadf1097c222228b22f3b86bb203636d4c355\"" May 17 00:34:09.414461 systemd[1]: Started cri-containerd-0c539edb76188690c1a9149789afadf1097c222228b22f3b86bb203636d4c355.scope. May 17 00:34:09.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.425000 audit: BPF prog-id=205 op=LOAD May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4078 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353339656462373631383836393063316139313439373839616661 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4078 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353339656462373631383836393063316139313439373839616661 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit: BPF prog-id=206 op=LOAD May 17 00:34:09.426000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028adc0 items=0 ppid=4078 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353339656462373631383836393063316139313439373839616661 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit: BPF prog-id=207 op=LOAD May 17 00:34:09.426000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028ae08 items=0 ppid=4078 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353339656462373631383836393063316139313439373839616661 May 17 00:34:09.426000 audit: BPF prog-id=207 op=UNLOAD May 17 00:34:09.426000 audit: BPF prog-id=206 op=UNLOAD May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:09.426000 audit: BPF prog-id=208 op=LOAD May 17 00:34:09.426000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b218 items=0 ppid=4078 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:09.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063353339656462373631383836393063316139313439373839616661 May 17 00:34:09.626315 env[1200]: time="2025-05-17T00:34:09.626177522Z" level=info msg="StartContainer for \"0c539edb76188690c1a9149789afadf1097c222228b22f3b86bb203636d4c355\" returns successfully" May 17 00:34:10.028839 kubelet[1947]: E0517 00:34:10.028717 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:10.075299 kubelet[1947]: I0517 00:34:10.074720 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7944dd59d4-4mz58" podStartSLOduration=27.007188043 podStartE2EDuration="30.07469651s" podCreationTimestamp="2025-05-17 00:33:40 +0000 UTC" firstStartedPulling="2025-05-17 00:34:06.30793598 +0000 UTC m=+43.483289471" lastFinishedPulling="2025-05-17 00:34:09.375444447 +0000 UTC m=+46.550797938" observedRunningTime="2025-05-17 00:34:10.074604928 +0000 UTC m=+47.249958449" watchObservedRunningTime="2025-05-17 00:34:10.07469651 +0000 UTC m=+47.250050001" May 17 00:34:11.030607 kubelet[1947]: E0517 00:34:11.030574 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:11.046997 systemd[1]: run-containerd-runc-k8s.io-0c539edb76188690c1a9149789afadf1097c222228b22f3b86bb203636d4c355-runc.Uu6Vs7.mount: Deactivated successfully. May 17 00:34:12.824289 env[1200]: time="2025-05-17T00:34:12.824225753Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.826538 env[1200]: time="2025-05-17T00:34:12.826493031Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.827902 env[1200]: time="2025-05-17T00:34:12.827867653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.829248 env[1200]: time="2025-05-17T00:34:12.829215504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:12.829637 env[1200]: time="2025-05-17T00:34:12.829594957Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:34:12.830934 env[1200]: time="2025-05-17T00:34:12.830903184Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\"" May 17 00:34:12.831666 env[1200]: time="2025-05-17T00:34:12.831634167Z" level=info msg="CreateContainer within sandbox \"2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:34:12.857606 env[1200]: time="2025-05-17T00:34:12.857549099Z" level=info msg="CreateContainer within sandbox \"2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6e33ae99302001c83cc3866670327643834c0ef5d3f4f021b9302d66e0f52f09\"" May 17 00:34:12.858470 env[1200]: time="2025-05-17T00:34:12.858407160Z" level=info msg="StartContainer for \"6e33ae99302001c83cc3866670327643834c0ef5d3f4f021b9302d66e0f52f09\"" May 17 00:34:12.891763 systemd[1]: Started cri-containerd-6e33ae99302001c83cc3866670327643834c0ef5d3f4f021b9302d66e0f52f09.scope. May 17 00:34:12.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit: BPF prog-id=209 op=LOAD May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4168 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333361653939333032303031633833636333383636363730333237 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4168 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333361653939333032303031633833636333383636363730333237 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit: BPF prog-id=210 op=LOAD May 17 00:34:12.903000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255fd0 items=0 ppid=4168 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333361653939333032303031633833636333383636363730333237 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.903000 audit: BPF prog-id=211 op=LOAD May 17 00:34:12.903000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000322018 items=0 ppid=4168 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.903000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333361653939333032303031633833636333383636363730333237 May 17 00:34:12.903000 audit: BPF prog-id=211 op=UNLOAD May 17 00:34:12.904000 audit: BPF prog-id=210 op=UNLOAD May 17 00:34:12.904000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:12.904000 audit: BPF prog-id=212 op=LOAD May 17 00:34:12.904000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000322428 items=0 ppid=4168 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:12.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665333361653939333032303031633833636333383636363730333237 May 17 00:34:13.002459 env[1200]: time="2025-05-17T00:34:13.002381965Z" level=info msg="StartContainer for \"6e33ae99302001c83cc3866670327643834c0ef5d3f4f021b9302d66e0f52f09\" returns successfully" May 17 00:34:13.068000 audit[4737]: NETFILTER_CFG table=filter:121 family=2 entries=14 op=nft_register_rule pid=4737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:13.068000 audit[4737]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffecac05330 a2=0 a3=7ffecac0531c items=0 ppid=2053 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:13.072000 audit[4737]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4737 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:13.072000 audit[4737]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffecac05330 a2=0 a3=7ffecac0531c items=0 ppid=2053 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.072000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:13.410201 env[1200]: time="2025-05-17T00:34:13.410134710Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:13.412741 env[1200]: time="2025-05-17T00:34:13.412676744Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:13.414531 env[1200]: time="2025-05-17T00:34:13.414462858Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:13.416048 env[1200]: time="2025-05-17T00:34:13.415998001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:ad7d2e76f15777636c5d91c108d7655659b38fe8970255050ffa51223eb96ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:13.416525 env[1200]: time="2025-05-17T00:34:13.416471230Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.30.0\" returns image reference \"sha256:5fa544b30bbe7e24458b21b80890f8834eebe8bcb99071f6caded1a39fc59082\"" May 17 00:34:13.418197 env[1200]: time="2025-05-17T00:34:13.418163298Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\"" May 17 00:34:13.418926 env[1200]: time="2025-05-17T00:34:13.418899781Z" level=info msg="CreateContainer within sandbox \"b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 17 00:34:13.432761 env[1200]: time="2025-05-17T00:34:13.432720577Z" level=info msg="CreateContainer within sandbox \"b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"23ea971627e3e48bf7fbfad1fa95d27db16d6c70a73f92b5a4cefc42c3be4625\"" May 17 00:34:13.433640 env[1200]: time="2025-05-17T00:34:13.433619976Z" level=info msg="StartContainer for \"23ea971627e3e48bf7fbfad1fa95d27db16d6c70a73f92b5a4cefc42c3be4625\"" May 17 00:34:13.473981 systemd[1]: Started cri-containerd-23ea971627e3e48bf7fbfad1fa95d27db16d6c70a73f92b5a4cefc42c3be4625.scope. May 17 00:34:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.485000 audit: BPF prog-id=213 op=LOAD May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4223 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656139373136323765336534386266376662666164316661393564 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=4223 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656139373136323765336534386266376662666164316661393564 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit: BPF prog-id=214 op=LOAD May 17 00:34:13.486000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003d0c20 items=0 ppid=4223 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656139373136323765336534386266376662666164316661393564 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit: BPF prog-id=215 op=LOAD May 17 00:34:13.486000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003d0c68 items=0 ppid=4223 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656139373136323765336534386266376662666164316661393564 May 17 00:34:13.486000 audit: BPF prog-id=215 op=UNLOAD May 17 00:34:13.486000 audit: BPF prog-id=214 op=UNLOAD May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { perfmon } for pid=4745 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit[4745]: AVC avc: denied { bpf } for pid=4745 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:13.486000 audit: BPF prog-id=216 op=LOAD May 17 00:34:13.486000 audit[4745]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003d1078 items=0 ppid=4223 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:13.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233656139373136323765336534386266376662666164316661393564 May 17 00:34:13.514869 env[1200]: time="2025-05-17T00:34:13.514365930Z" level=info msg="StartContainer for \"23ea971627e3e48bf7fbfad1fa95d27db16d6c70a73f92b5a4cefc42c3be4625\" returns successfully" May 17 00:34:13.773000 audit[4713]: AVC avc: denied { watch } for pid=4713 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_33_51.868246809/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c300,c834 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c300,c834 tclass=file permissive=0 May 17 00:34:13.773000 audit[4713]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003ca940 a2=fc6 a3=0 items=0 ppid=4168 pid=4713 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c300,c834 key=(null) May 17 00:34:13.773000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:34:13.994725 systemd[1]: Started sshd@10-10.0.0.99:22-10.0.0.1:40694.service. May 17 00:34:13.997065 kernel: kauditd_printk_skb: 187 callbacks suppressed May 17 00:34:13.997409 kernel: audit: type=1130 audit(1747442053.993:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.99:22-10.0.0.1:40694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:13.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.99:22-10.0.0.1:40694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.039207 kubelet[1947]: I0517 00:34:14.038927 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:34:14.043000 audit[4780]: USER_ACCT pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.044438 sshd[4780]: Accepted publickey for core from 10.0.0.1 port 40694 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:14.050367 kernel: audit: type=1101 audit(1747442054.043:1420): pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.049000 audit[4780]: CRED_ACQ pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.054285 kubelet[1947]: I0517 00:34:14.051441 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-vgvnz" podStartSLOduration=30.798543355 podStartE2EDuration="37.051415133s" podCreationTimestamp="2025-05-17 00:33:37 +0000 UTC" firstStartedPulling="2025-05-17 00:34:06.57749061 +0000 UTC m=+43.752844091" lastFinishedPulling="2025-05-17 00:34:12.830362388 +0000 UTC m=+50.005715869" observedRunningTime="2025-05-17 00:34:13.048135823 +0000 UTC m=+50.223489314" watchObservedRunningTime="2025-05-17 00:34:14.051415133 +0000 UTC m=+51.226768644" May 17 00:34:14.054285 kubelet[1947]: I0517 00:34:14.051890 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5f7f6d44f8-mqnv5" podStartSLOduration=30.461246399 podStartE2EDuration="37.051882109s" podCreationTimestamp="2025-05-17 00:33:37 +0000 UTC" firstStartedPulling="2025-05-17 00:34:06.826711085 +0000 UTC m=+44.002064586" lastFinishedPulling="2025-05-17 00:34:13.417346815 +0000 UTC m=+50.592700296" observedRunningTime="2025-05-17 00:34:14.051217791 +0000 UTC m=+51.226571282" watchObservedRunningTime="2025-05-17 00:34:14.051882109 +0000 UTC m=+51.227235600" May 17 00:34:14.054601 sshd[4780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:14.057989 kernel: audit: type=1103 audit(1747442054.049:1421): pid=4780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.058095 kernel: audit: type=1006 audit(1747442054.053:1422): pid=4780 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 17 00:34:14.063984 kernel: audit: type=1300 audit(1747442054.053:1422): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8c370d80 a2=3 a3=0 items=0 ppid=1 pid=4780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.053000 audit[4780]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8c370d80 a2=3 a3=0 items=0 ppid=1 pid=4780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.066355 kernel: audit: type=1327 audit(1747442054.053:1422): proctitle=737368643A20636F7265205B707269765D May 17 00:34:14.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:14.060275 systemd[1]: Started session-11.scope. May 17 00:34:14.062131 systemd-logind[1188]: New session 11 of user core. May 17 00:34:14.067000 audit[4780]: USER_START pid=4780 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.068000 audit[4783]: CRED_ACQ pid=4783 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.076374 kernel: audit: type=1105 audit(1747442054.067:1423): pid=4780 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.076451 kernel: audit: type=1103 audit(1747442054.068:1424): pid=4783 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.076488 kernel: audit: type=1325 audit(1747442054.070:1425): table=filter:123 family=2 entries=14 op=nft_register_rule pid=4784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.070000 audit[4784]: NETFILTER_CFG table=filter:123 family=2 entries=14 op=nft_register_rule pid=4784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.070000 audit[4784]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe70343840 a2=0 a3=7ffe7034382c items=0 ppid=2053 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.084367 kernel: audit: type=1300 audit(1747442054.070:1425): arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe70343840 a2=0 a3=7ffe7034382c items=0 ppid=2053 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.085000 audit[4784]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4784 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.085000 audit[4784]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe70343840 a2=0 a3=7ffe7034382c items=0 ppid=2053 pid=4784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.327196 sshd[4780]: pam_unix(sshd:session): session closed for user core May 17 00:34:14.327000 audit[4780]: USER_END pid=4780 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.327000 audit[4780]: CRED_DISP pid=4780 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.330902 systemd[1]: sshd@10-10.0.0.99:22-10.0.0.1:40694.service: Deactivated successfully. May 17 00:34:14.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.99:22-10.0.0.1:40694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.331674 systemd[1]: session-11.scope: Deactivated successfully. May 17 00:34:14.334168 systemd-logind[1188]: Session 11 logged out. Waiting for processes to exit. May 17 00:34:14.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.99:22-10.0.0.1:40704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.337320 systemd[1]: Started sshd@11-10.0.0.99:22-10.0.0.1:40704.service. May 17 00:34:14.338718 systemd-logind[1188]: Removed session 11. May 17 00:34:14.382856 sshd[4796]: Accepted publickey for core from 10.0.0.1 port 40704 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:14.381000 audit[4796]: USER_ACCT pid=4796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.384236 sshd[4796]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:14.382000 audit[4796]: CRED_ACQ pid=4796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.382000 audit[4796]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc70b380b0 a2=3 a3=0 items=0 ppid=1 pid=4796 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.382000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:14.388212 systemd-logind[1188]: New session 12 of user core. May 17 00:34:14.388963 systemd[1]: Started session-12.scope. May 17 00:34:14.392000 audit[4796]: USER_START pid=4796 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.394000 audit[4798]: CRED_ACQ pid=4798 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.542000 audit[4755]: AVC avc: denied { watch } for pid=4755 comm="apiserver" path="/calico-apiserver-certs/..2025_05_17_00_33_51.2218525965/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c345,c928 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c345,c928 tclass=file permissive=0 May 17 00:34:14.542000 audit[4755]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0010cdf80 a2=fc6 a3=0 items=0 ppid=4223 pid=4755 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c345,c928 key=(null) May 17 00:34:14.542000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 17 00:34:14.562796 sshd[4796]: pam_unix(sshd:session): session closed for user core May 17 00:34:14.563000 audit[4796]: USER_END pid=4796 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.564000 audit[4796]: CRED_DISP pid=4796 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.565942 systemd[1]: Started sshd@12-10.0.0.99:22-10.0.0.1:40718.service. May 17 00:34:14.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.99:22-10.0.0.1:40718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.570352 systemd-logind[1188]: Session 12 logged out. Waiting for processes to exit. May 17 00:34:14.571312 systemd[1]: sshd@11-10.0.0.99:22-10.0.0.1:40704.service: Deactivated successfully. May 17 00:34:14.572107 systemd[1]: session-12.scope: Deactivated successfully. May 17 00:34:14.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.99:22-10.0.0.1:40704 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.573181 systemd-logind[1188]: Removed session 12. May 17 00:34:14.594000 audit[4811]: NETFILTER_CFG table=filter:125 family=2 entries=13 op=nft_register_rule pid=4811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.594000 audit[4811]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffea1be6e90 a2=0 a3=7ffea1be6e7c items=0 ppid=2053 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.594000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.601000 audit[4811]: NETFILTER_CFG table=nat:126 family=2 entries=27 op=nft_register_chain pid=4811 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:14.601000 audit[4811]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffea1be6e90 a2=0 a3=7ffea1be6e7c items=0 ppid=2053 pid=4811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:14.611000 audit[4807]: USER_ACCT pid=4807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.612975 sshd[4807]: Accepted publickey for core from 10.0.0.1 port 40718 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:14.612000 audit[4807]: CRED_ACQ pid=4807 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.612000 audit[4807]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca27a7c80 a2=3 a3=0 items=0 ppid=1 pid=4807 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:14.612000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:14.613983 sshd[4807]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:14.618824 systemd[1]: Started session-13.scope. May 17 00:34:14.618963 systemd-logind[1188]: New session 13 of user core. May 17 00:34:14.623000 audit[4807]: USER_START pid=4807 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.624000 audit[4812]: CRED_ACQ pid=4812 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.791945 sshd[4807]: pam_unix(sshd:session): session closed for user core May 17 00:34:14.791000 audit[4807]: USER_END pid=4807 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.792000 audit[4807]: CRED_DISP pid=4807 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:14.797244 systemd[1]: sshd@12-10.0.0.99:22-10.0.0.1:40718.service: Deactivated successfully. May 17 00:34:14.798169 systemd[1]: session-13.scope: Deactivated successfully. May 17 00:34:14.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.99:22-10.0.0.1:40718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:14.798916 systemd-logind[1188]: Session 13 logged out. Waiting for processes to exit. May 17 00:34:14.799748 systemd-logind[1188]: Removed session 13. May 17 00:34:15.081703 env[1200]: time="2025-05-17T00:34:15.081644319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.084357 env[1200]: time="2025-05-17T00:34:15.084319573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.108207 env[1200]: time="2025-05-17T00:34:15.108141095Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.131126 env[1200]: time="2025-05-17T00:34:15.131092595Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:27883a4104876fe239311dd93ce6efd0c4a87de7163d57a4c8d96bd65a287ffd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:15.131577 env[1200]: time="2025-05-17T00:34:15.131546989Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.30.0\" returns image reference \"sha256:d5b08093b7928c0ac1122e59edf69b2e58c6d10ecc8b9e5cffeb809a956dc48e\"" May 17 00:34:15.132756 env[1200]: time="2025-05-17T00:34:15.132596809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:34:15.133709 env[1200]: time="2025-05-17T00:34:15.133670134Z" level=info msg="CreateContainer within sandbox \"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 17 00:34:15.157114 env[1200]: time="2025-05-17T00:34:15.157066781Z" level=info msg="CreateContainer within sandbox \"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"32029ae38210e4bcb8d3749f0b5535a008d810f9580446951d443c2ed7718891\"" May 17 00:34:15.157701 env[1200]: time="2025-05-17T00:34:15.157664081Z" level=info msg="StartContainer for \"32029ae38210e4bcb8d3749f0b5535a008d810f9580446951d443c2ed7718891\"" May 17 00:34:15.179932 systemd[1]: run-containerd-runc-k8s.io-32029ae38210e4bcb8d3749f0b5535a008d810f9580446951d443c2ed7718891-runc.hotpYf.mount: Deactivated successfully. May 17 00:34:15.181407 systemd[1]: Started cri-containerd-32029ae38210e4bcb8d3749f0b5535a008d810f9580446951d443c2ed7718891.scope. May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f99781506d8 items=0 ppid=4422 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332303239616533383231306534626362386433373439663062353533 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit: BPF prog-id=217 op=LOAD May 17 00:34:15.192000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002e1da8 items=0 ppid=4422 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332303239616533383231306534626362386433373439663062353533 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.192000 audit: BPF prog-id=218 op=LOAD May 17 00:34:15.192000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002e1df8 items=0 ppid=4422 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332303239616533383231306534626362386433373439663062353533 May 17 00:34:15.193000 audit: BPF prog-id=218 op=UNLOAD May 17 00:34:15.193000 audit: BPF prog-id=217 op=UNLOAD May 17 00:34:15.193000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { perfmon } for pid=4829 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit[4829]: AVC avc: denied { bpf } for pid=4829 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:15.193000 audit: BPF prog-id=219 op=LOAD May 17 00:34:15.193000 audit[4829]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002e1e88 items=0 ppid=4422 pid=4829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:15.193000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332303239616533383231306534626362386433373439663062353533 May 17 00:34:15.207516 env[1200]: time="2025-05-17T00:34:15.207444662Z" level=info msg="StartContainer for \"32029ae38210e4bcb8d3749f0b5535a008d810f9580446951d443c2ed7718891\" returns successfully" May 17 00:34:15.374517 env[1200]: time="2025-05-17T00:34:15.374361295Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:15.375598 env[1200]: time="2025-05-17T00:34:15.375545809Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:15.375942 kubelet[1947]: E0517 00:34:15.375897 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:15.376251 kubelet[1947]: E0517 00:34:15.375961 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:15.376282 kubelet[1947]: E0517 00:34:15.376215 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-92dt5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-8c4cx_calico-system(01f33b6b-253c-4c1e-93af-24789a3c3b42): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:15.376518 env[1200]: time="2025-05-17T00:34:15.376461428Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:34:15.377565 kubelet[1947]: E0517 00:34:15.377495 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-8c4cx" podUID="01f33b6b-253c-4c1e-93af-24789a3c3b42" May 17 00:34:15.644103 env[1200]: time="2025-05-17T00:34:15.643923380Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:15.657161 env[1200]: time="2025-05-17T00:34:15.657083091Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:15.657370 kubelet[1947]: E0517 00:34:15.657324 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:15.657418 kubelet[1947]: E0517 00:34:15.657378 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:15.657612 kubelet[1947]: E0517 00:34:15.657565 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:3587bf1e80664abdaf5d78c57ed793ea,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-qq764,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-66fc645cdc-cm9xr_calico-system(36c092a0-1ee9-4f64-9ad5-c04a441646ec): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:15.657837 env[1200]: time="2025-05-17T00:34:15.657791040Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\"" May 17 00:34:16.045655 kubelet[1947]: E0517 00:34:16.045530 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-8c4cx" podUID="01f33b6b-253c-4c1e-93af-24789a3c3b42" May 17 00:34:16.064000 audit[4857]: NETFILTER_CFG table=filter:127 family=2 entries=12 op=nft_register_rule pid=4857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:16.064000 audit[4857]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffed188f6c0 a2=0 a3=7ffed188f6ac items=0 ppid=2053 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:16.068000 audit[4857]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4857 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:16.068000 audit[4857]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffed188f6c0 a2=0 a3=7ffed188f6ac items=0 ppid=2053 pid=4857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:16.068000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:18.942000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:18.942000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:18.942000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e35a20 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:34:18.942000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00249e570 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:34:18.942000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:18.942000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:19.225082 env[1200]: time="2025-05-17T00:34:19.224956871Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.227139 env[1200]: time="2025-05-17T00:34:19.227094644Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.228443 env[1200]: time="2025-05-17T00:34:19.228410465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.229937 env[1200]: time="2025-05-17T00:34:19.229892728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:dca5c16181edde2e860463615523ce457cd9dcfca85b7cfdcd6f3ea7de6f2ac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 17 00:34:19.230311 env[1200]: time="2025-05-17T00:34:19.230277921Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.30.0\" returns image reference \"sha256:45c8692ffc029387ee93ba83da8ad26da9749cf2ba6ed03981f8f9933ed5a5b0\"" May 17 00:34:19.231197 env[1200]: time="2025-05-17T00:34:19.231172631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:34:19.232286 env[1200]: time="2025-05-17T00:34:19.232264150Z" level=info msg="CreateContainer within sandbox \"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 17 00:34:19.246167 env[1200]: time="2025-05-17T00:34:19.246143429Z" level=info msg="CreateContainer within sandbox \"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ef44721cdf8afe1a05a8574e847a9c1041b3d40ae35cda4ca5f7116e9f1dfba6\"" May 17 00:34:19.255319 kernel: kauditd_printk_skb: 93 callbacks suppressed May 17 00:34:19.255510 kernel: audit: type=1400 audit(1747442059.246:1461): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.255628 kernel: audit: type=1400 audit(1747442059.246:1462): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.246000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.246000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.255745 env[1200]: time="2025-05-17T00:34:19.246910740Z" level=info msg="StartContainer for \"ef44721cdf8afe1a05a8574e847a9c1041b3d40ae35cda4ca5f7116e9f1dfba6\"" May 17 00:34:19.246000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0123fb770 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.261880 kernel: audit: type=1300 audit(1747442059.246:1461): arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c0123fb770 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.261992 kernel: audit: type=1327 audit(1747442059.246:1461): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.246000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00edc3060 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.272211 kernel: audit: type=1300 audit(1747442059.246:1462): arch=c000003e syscall=254 success=no exit=-13 a0=7d a1=c00edc3060 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.274646 systemd[1]: Started cri-containerd-ef44721cdf8afe1a05a8574e847a9c1041b3d40ae35cda4ca5f7116e9f1dfba6.scope. May 17 00:34:19.246000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.281753 kernel: audit: type=1327 audit(1747442059.246:1462): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.281818 kernel: audit: type=1400 audit(1747442059.246:1463): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.281839 kernel: audit: type=1300 audit(1747442059.246:1463): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c009f770b0 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.246000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c009f770b0 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.246000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.252000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.299361 kernel: audit: type=1327 audit(1747442059.246:1463): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.299572 kernel: audit: type=1400 audit(1747442059.252:1464): avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.252000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0123fb800 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.252000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.255000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.255000 audit[1809]: AVC avc: denied { watch } for pid=1809 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:19.255000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c012161e30 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.255000 audit[1809]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00be14760 a2=fc6 a3=0 items=0 ppid=1665 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c338,c946 key=(null) May 17 00:34:19.255000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3939002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 17 00:34:19.295000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f4454a16838 items=0 ppid=4422 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:19.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343437323163646638616665316130356138353734653834376139 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.295000 audit: BPF prog-id=220 op=LOAD May 17 00:34:19.295000 audit[4873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0002872f8 items=0 ppid=4422 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:19.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343437323163646638616665316130356138353734653834376139 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit: BPF prog-id=221 op=LOAD May 17 00:34:19.298000 audit[4873]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000287348 items=0 ppid=4422 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:19.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343437323163646638616665316130356138353734653834376139 May 17 00:34:19.298000 audit: BPF prog-id=221 op=UNLOAD May 17 00:34:19.298000 audit: BPF prog-id=220 op=UNLOAD May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { perfmon } for pid=4873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit[4873]: AVC avc: denied { bpf } for pid=4873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 17 00:34:19.298000 audit: BPF prog-id=222 op=LOAD May 17 00:34:19.298000 audit[4873]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0002873d8 items=0 ppid=4422 pid=4873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:19.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6566343437323163646638616665316130356138353734653834376139 May 17 00:34:19.444745 env[1200]: time="2025-05-17T00:34:19.444692228Z" level=info msg="StartContainer for \"ef44721cdf8afe1a05a8574e847a9c1041b3d40ae35cda4ca5f7116e9f1dfba6\" returns successfully" May 17 00:34:19.628994 env[1200]: time="2025-05-17T00:34:19.628929758Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:19.630048 env[1200]: time="2025-05-17T00:34:19.629986672Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:19.630269 kubelet[1947]: E0517 00:34:19.630214 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:19.630589 kubelet[1947]: E0517 00:34:19.630273 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:19.630589 kubelet[1947]: E0517 00:34:19.630401 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-qq764,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-66fc645cdc-cm9xr_calico-system(36c092a0-1ee9-4f64-9ad5-c04a441646ec): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:19.631909 kubelet[1947]: E0517 00:34:19.631857 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-66fc645cdc-cm9xr" podUID="36c092a0-1ee9-4f64-9ad5-c04a441646ec" May 17 00:34:19.796706 systemd[1]: Started sshd@13-10.0.0.99:22-10.0.0.1:45238.service. May 17 00:34:19.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.99:22-10.0.0.1:45238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:19.839000 audit[4904]: USER_ACCT pid=4904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:19.840891 sshd[4904]: Accepted publickey for core from 10.0.0.1 port 45238 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:19.840000 audit[4904]: CRED_ACQ pid=4904 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:19.840000 audit[4904]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1f883920 a2=3 a3=0 items=0 ppid=1 pid=4904 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:19.840000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:19.842041 sshd[4904]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:19.845488 systemd-logind[1188]: New session 14 of user core. May 17 00:34:19.846502 systemd[1]: Started session-14.scope. May 17 00:34:19.849000 audit[4904]: USER_START pid=4904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:19.850000 audit[4906]: CRED_ACQ pid=4906 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:19.970658 kubelet[1947]: I0517 00:34:19.970482 1947 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 17 00:34:19.970658 kubelet[1947]: I0517 00:34:19.970527 1947 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 17 00:34:20.023875 sshd[4904]: pam_unix(sshd:session): session closed for user core May 17 00:34:20.023000 audit[4904]: USER_END pid=4904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:20.023000 audit[4904]: CRED_DISP pid=4904 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:20.026434 systemd[1]: sshd@13-10.0.0.99:22-10.0.0.1:45238.service: Deactivated successfully. May 17 00:34:20.027206 systemd[1]: session-14.scope: Deactivated successfully. May 17 00:34:20.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.99:22-10.0.0.1:45238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:20.027970 systemd-logind[1188]: Session 14 logged out. Waiting for processes to exit. May 17 00:34:20.028763 systemd-logind[1188]: Removed session 14. May 17 00:34:20.068862 kubelet[1947]: I0517 00:34:20.068807 1947 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-vkxng" podStartSLOduration=28.017661581 podStartE2EDuration="40.068783437s" podCreationTimestamp="2025-05-17 00:33:40 +0000 UTC" firstStartedPulling="2025-05-17 00:34:07.179880065 +0000 UTC m=+44.355233556" lastFinishedPulling="2025-05-17 00:34:19.231001921 +0000 UTC m=+56.406355412" observedRunningTime="2025-05-17 00:34:20.068731389 +0000 UTC m=+57.244084881" watchObservedRunningTime="2025-05-17 00:34:20.068783437 +0000 UTC m=+57.244136928" May 17 00:34:22.884998 env[1200]: time="2025-05-17T00:34:22.884958406Z" level=info msg="StopPodSandbox for \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\"" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.021 [WARNING][4927] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f48ef61-1a96-4b80-89cb-94f293d8a38e", ResourceVersion:"1138", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb", Pod:"calico-apiserver-5f7f6d44f8-mqnv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9f08b23d8cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.022 [INFO][4927] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.022 [INFO][4927] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" iface="eth0" netns="" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.022 [INFO][4927] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.022 [INFO][4927] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.045 [INFO][4938] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.045 [INFO][4938] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.045 [INFO][4938] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.055 [WARNING][4938] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.055 [INFO][4938] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.059 [INFO][4938] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.064348 env[1200]: 2025-05-17 00:34:23.062 [INFO][4927] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.064877 env[1200]: time="2025-05-17T00:34:23.064387630Z" level=info msg="TearDown network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\" successfully" May 17 00:34:23.064877 env[1200]: time="2025-05-17T00:34:23.064430912Z" level=info msg="StopPodSandbox for \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\" returns successfully" May 17 00:34:23.065091 env[1200]: time="2025-05-17T00:34:23.065057508Z" level=info msg="RemovePodSandbox for \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\"" May 17 00:34:23.065135 env[1200]: time="2025-05-17T00:34:23.065098475Z" level=info msg="Forcibly stopping sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\"" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.104 [WARNING][4956] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"5f48ef61-1a96-4b80-89cb-94f293d8a38e", ResourceVersion:"1138", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b7b64353b1f4c381c61fff76553b9ba7d8c521fde159ecc8b2ad7c8a3ee8ccdb", Pod:"calico-apiserver-5f7f6d44f8-mqnv5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9f08b23d8cd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.104 [INFO][4956] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.104 [INFO][4956] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" iface="eth0" netns="" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.104 [INFO][4956] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.104 [INFO][4956] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.121 [INFO][4965] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.122 [INFO][4965] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.122 [INFO][4965] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.128 [WARNING][4965] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.128 [INFO][4965] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" HandleID="k8s-pod-network.6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--mqnv5-eth0" May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.130 [INFO][4965] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.133523 env[1200]: 2025-05-17 00:34:23.131 [INFO][4956] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a" May 17 00:34:23.133970 env[1200]: time="2025-05-17T00:34:23.133564364Z" level=info msg="TearDown network for sandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\" successfully" May 17 00:34:23.206717 env[1200]: time="2025-05-17T00:34:23.206586276Z" level=info msg="RemovePodSandbox \"6860f35dde3a8f33c2d17d5ad11e62a6fa921b0bea4e96e78b58dc353dcc680a\" returns successfully" May 17 00:34:23.207143 env[1200]: time="2025-05-17T00:34:23.207117042Z" level=info msg="StopPodSandbox for \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\"" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.259 [WARNING][4985] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"01f33b6b-253c-4c1e-93af-24789a3c3b42", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9", Pod:"goldmane-8f77d7b6c-8c4cx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali91ea4c0e851", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.259 [INFO][4985] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.259 [INFO][4985] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" iface="eth0" netns="" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.259 [INFO][4985] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.259 [INFO][4985] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.279 [INFO][4994] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.279 [INFO][4994] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.279 [INFO][4994] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.301 [WARNING][4994] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.301 [INFO][4994] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.303 [INFO][4994] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.307212 env[1200]: 2025-05-17 00:34:23.304 [INFO][4985] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.307696 env[1200]: time="2025-05-17T00:34:23.307249499Z" level=info msg="TearDown network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\" successfully" May 17 00:34:23.307696 env[1200]: time="2025-05-17T00:34:23.307292409Z" level=info msg="StopPodSandbox for \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\" returns successfully" May 17 00:34:23.307773 env[1200]: time="2025-05-17T00:34:23.307743696Z" level=info msg="RemovePodSandbox for \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\"" May 17 00:34:23.307841 env[1200]: time="2025-05-17T00:34:23.307779964Z" level=info msg="Forcibly stopping sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\"" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.347 [WARNING][5014] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0", GenerateName:"goldmane-8f77d7b6c-", Namespace:"calico-system", SelfLink:"", UID:"01f33b6b-253c-4c1e-93af-24789a3c3b42", ResourceVersion:"1175", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"goldmane", "k8s-app":"goldmane", "pod-template-hash":"8f77d7b6c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"goldmane"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"aee1a5309ad920561be5c5b41ab0f75ca20949e7d7107aa878f780c8bedcc5b9", Pod:"goldmane-8f77d7b6c-8c4cx", Endpoint:"eth0", ServiceAccountName:"goldmane", IPNetworks:[]string{"192.168.88.136/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.goldmane"}, InterfaceName:"cali91ea4c0e851", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.347 [INFO][5014] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.348 [INFO][5014] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" iface="eth0" netns="" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.348 [INFO][5014] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.348 [INFO][5014] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.369 [INFO][5023] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.369 [INFO][5023] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.369 [INFO][5023] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.374 [WARNING][5023] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.374 [INFO][5023] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" HandleID="k8s-pod-network.dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" Workload="localhost-k8s-goldmane--8f77d7b6c--8c4cx-eth0" May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.375 [INFO][5023] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.378448 env[1200]: 2025-05-17 00:34:23.377 [INFO][5014] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4" May 17 00:34:23.379062 env[1200]: time="2025-05-17T00:34:23.378476140Z" level=info msg="TearDown network for sandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\" successfully" May 17 00:34:23.382082 env[1200]: time="2025-05-17T00:34:23.382045932Z" level=info msg="RemovePodSandbox \"dd75b3b6bd8f86d34e4c1ace717c7fb399d12d1bbd0a85cc62f5feea2b6a0ec4\" returns successfully" May 17 00:34:23.382565 env[1200]: time="2025-05-17T00:34:23.382535971Z" level=info msg="StopPodSandbox for \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\"" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.412 [WARNING][5042] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6460ee60-efd6-4594-b67c-0eef44ca4cb2", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0", Pod:"coredns-7c65d6cfc9-6xzzb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida34622bbab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.412 [INFO][5042] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.412 [INFO][5042] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" iface="eth0" netns="" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.412 [INFO][5042] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.412 [INFO][5042] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.431 [INFO][5051] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.431 [INFO][5051] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.431 [INFO][5051] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.437 [WARNING][5051] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.437 [INFO][5051] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.439 [INFO][5051] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.441944 env[1200]: 2025-05-17 00:34:23.440 [INFO][5042] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.442432 env[1200]: time="2025-05-17T00:34:23.441998699Z" level=info msg="TearDown network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\" successfully" May 17 00:34:23.442432 env[1200]: time="2025-05-17T00:34:23.442061237Z" level=info msg="StopPodSandbox for \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\" returns successfully" May 17 00:34:23.442674 env[1200]: time="2025-05-17T00:34:23.442653258Z" level=info msg="RemovePodSandbox for \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\"" May 17 00:34:23.442787 env[1200]: time="2025-05-17T00:34:23.442749008Z" level=info msg="Forcibly stopping sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\"" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.476 [WARNING][5068] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"6460ee60-efd6-4594-b67c-0eef44ca4cb2", ResourceVersion:"1025", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"73df9eb06eee1e086e4ccaeda46993d058a1960f54902ac8b811be1465455ce0", Pod:"coredns-7c65d6cfc9-6xzzb", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calida34622bbab", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.476 [INFO][5068] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.476 [INFO][5068] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" iface="eth0" netns="" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.476 [INFO][5068] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.476 [INFO][5068] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.496 [INFO][5076] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.496 [INFO][5076] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.496 [INFO][5076] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.501 [WARNING][5076] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.501 [INFO][5076] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" HandleID="k8s-pod-network.f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" Workload="localhost-k8s-coredns--7c65d6cfc9--6xzzb-eth0" May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.503 [INFO][5076] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.505917 env[1200]: 2025-05-17 00:34:23.504 [INFO][5068] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6" May 17 00:34:23.505917 env[1200]: time="2025-05-17T00:34:23.505874300Z" level=info msg="TearDown network for sandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\" successfully" May 17 00:34:23.509836 env[1200]: time="2025-05-17T00:34:23.509799600Z" level=info msg="RemovePodSandbox \"f47f846a79277699e3bddb5381744fc9fe11c5f5e2ac603413616c06a349b9f6\" returns successfully" May 17 00:34:23.510329 env[1200]: time="2025-05-17T00:34:23.510298576Z" level=info msg="StopPodSandbox for \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\"" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.537 [WARNING][5095] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"fb24c1ad-1d22-43e4-8f64-d7c39476dce8", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e", Pod:"calico-apiserver-5f7f6d44f8-vgvnz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali738f8e01624", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.537 [INFO][5095] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.538 [INFO][5095] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" iface="eth0" netns="" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.539 [INFO][5095] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.539 [INFO][5095] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.559 [INFO][5104] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.559 [INFO][5104] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.559 [INFO][5104] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.565 [WARNING][5104] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.565 [INFO][5104] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.567 [INFO][5104] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.570883 env[1200]: 2025-05-17 00:34:23.568 [INFO][5095] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.571349 env[1200]: time="2025-05-17T00:34:23.570909680Z" level=info msg="TearDown network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\" successfully" May 17 00:34:23.571349 env[1200]: time="2025-05-17T00:34:23.570956197Z" level=info msg="StopPodSandbox for \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\" returns successfully" May 17 00:34:23.571625 env[1200]: time="2025-05-17T00:34:23.571587883Z" level=info msg="RemovePodSandbox for \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\"" May 17 00:34:23.571667 env[1200]: time="2025-05-17T00:34:23.571629672Z" level=info msg="Forcibly stopping sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\"" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.597 [WARNING][5122] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0", GenerateName:"calico-apiserver-5f7f6d44f8-", Namespace:"calico-apiserver", SelfLink:"", UID:"fb24c1ad-1d22-43e4-8f64-d7c39476dce8", ResourceVersion:"1122", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 37, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5f7f6d44f8", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2645b702c01bfe91985809e63f29cb858625dd7f0a2abd2f6de66b1da114e02e", Pod:"calico-apiserver-5f7f6d44f8-vgvnz", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali738f8e01624", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.598 [INFO][5122] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.598 [INFO][5122] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" iface="eth0" netns="" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.598 [INFO][5122] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.598 [INFO][5122] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.615 [INFO][5133] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.615 [INFO][5133] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.615 [INFO][5133] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.620 [WARNING][5133] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.620 [INFO][5133] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" HandleID="k8s-pod-network.258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" Workload="localhost-k8s-calico--apiserver--5f7f6d44f8--vgvnz-eth0" May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.621 [INFO][5133] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.624313 env[1200]: 2025-05-17 00:34:23.622 [INFO][5122] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d" May 17 00:34:23.624840 env[1200]: time="2025-05-17T00:34:23.624321007Z" level=info msg="TearDown network for sandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\" successfully" May 17 00:34:23.631360 env[1200]: time="2025-05-17T00:34:23.631303706Z" level=info msg="RemovePodSandbox \"258d0564ab4ae1038e83b02221c4fc3d35fdfb90d0d20c5cff6190718d03d23d\" returns successfully" May 17 00:34:23.631827 env[1200]: time="2025-05-17T00:34:23.631806260Z" level=info msg="StopPodSandbox for \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\"" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.658 [WARNING][5152] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" WorkloadEndpoint="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.658 [INFO][5152] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.658 [INFO][5152] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" iface="eth0" netns="" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.659 [INFO][5152] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.659 [INFO][5152] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.676 [INFO][5161] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.676 [INFO][5161] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.676 [INFO][5161] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.682 [WARNING][5161] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.682 [INFO][5161] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.683 [INFO][5161] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.686686 env[1200]: 2025-05-17 00:34:23.685 [INFO][5152] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.687097 env[1200]: time="2025-05-17T00:34:23.686697014Z" level=info msg="TearDown network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\" successfully" May 17 00:34:23.687097 env[1200]: time="2025-05-17T00:34:23.686735256Z" level=info msg="StopPodSandbox for \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\" returns successfully" May 17 00:34:23.687403 env[1200]: time="2025-05-17T00:34:23.687359328Z" level=info msg="RemovePodSandbox for \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\"" May 17 00:34:23.687454 env[1200]: time="2025-05-17T00:34:23.687409392Z" level=info msg="Forcibly stopping sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\"" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.716 [WARNING][5178] cni-plugin/k8s.go 598: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" WorkloadEndpoint="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.716 [INFO][5178] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.716 [INFO][5178] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" iface="eth0" netns="" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.716 [INFO][5178] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.716 [INFO][5178] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.732 [INFO][5187] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.732 [INFO][5187] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.732 [INFO][5187] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.739 [WARNING][5187] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.739 [INFO][5187] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" HandleID="k8s-pod-network.afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" Workload="localhost-k8s-whisker--6d6599c88c--mkdtj-eth0" May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.740 [INFO][5187] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.744394 env[1200]: 2025-05-17 00:34:23.742 [INFO][5178] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446" May 17 00:34:23.744777 env[1200]: time="2025-05-17T00:34:23.744404878Z" level=info msg="TearDown network for sandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\" successfully" May 17 00:34:23.748483 env[1200]: time="2025-05-17T00:34:23.748426888Z" level=info msg="RemovePodSandbox \"afb89c95ca60fa2a48e65ffdd61f4d48d344f6dd4bc5fda23e12cdc88cffc446\" returns successfully" May 17 00:34:23.748977 env[1200]: time="2025-05-17T00:34:23.748932317Z" level=info msg="StopPodSandbox for \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\"" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.780 [WARNING][5206] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"ea10e578-7af0-4b41-a269-d133b5ba1bd6", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882", Pod:"coredns-7c65d6cfc9-qqxfp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79eb666be61", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.781 [INFO][5206] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.781 [INFO][5206] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" iface="eth0" netns="" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.781 [INFO][5206] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.781 [INFO][5206] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.800 [INFO][5214] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.800 [INFO][5214] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.800 [INFO][5214] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.805 [WARNING][5214] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.805 [INFO][5214] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.806 [INFO][5214] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.809555 env[1200]: 2025-05-17 00:34:23.808 [INFO][5206] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.811135 env[1200]: time="2025-05-17T00:34:23.809529925Z" level=info msg="TearDown network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\" successfully" May 17 00:34:23.811204 env[1200]: time="2025-05-17T00:34:23.811160806Z" level=info msg="StopPodSandbox for \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\" returns successfully" May 17 00:34:23.811774 env[1200]: time="2025-05-17T00:34:23.811721559Z" level=info msg="RemovePodSandbox for \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\"" May 17 00:34:23.811774 env[1200]: time="2025-05-17T00:34:23.811762035Z" level=info msg="Forcibly stopping sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\"" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.841 [WARNING][5232] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0", GenerateName:"coredns-7c65d6cfc9-", Namespace:"kube-system", SelfLink:"", UID:"ea10e578-7af0-4b41-a269-d133b5ba1bd6", ResourceVersion:"1084", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7c65d6cfc9", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bd6304c3802372814fb8d13c8106146647f4521b16e0a1762595ea2df8021882", Pod:"coredns-7c65d6cfc9-qqxfp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.135/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali79eb666be61", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.841 [INFO][5232] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.841 [INFO][5232] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" iface="eth0" netns="" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.841 [INFO][5232] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.841 [INFO][5232] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.859 [INFO][5241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.859 [INFO][5241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.859 [INFO][5241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.864 [WARNING][5241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.864 [INFO][5241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" HandleID="k8s-pod-network.ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" Workload="localhost-k8s-coredns--7c65d6cfc9--qqxfp-eth0" May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.865 [INFO][5241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.868962 env[1200]: 2025-05-17 00:34:23.867 [INFO][5232] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc" May 17 00:34:23.869629 env[1200]: time="2025-05-17T00:34:23.868974128Z" level=info msg="TearDown network for sandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\" successfully" May 17 00:34:23.874610 env[1200]: time="2025-05-17T00:34:23.874569662Z" level=info msg="RemovePodSandbox \"ef795a297b1284f5e6f99d458e49d5f239f5aa1d81b387f4bf5e683935393dbc\" returns successfully" May 17 00:34:23.875135 env[1200]: time="2025-05-17T00:34:23.875096050Z" level=info msg="StopPodSandbox for \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\"" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.904 [WARNING][5259] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0", GenerateName:"calico-kube-controllers-7944dd59d4-", Namespace:"calico-system", SelfLink:"", UID:"8071938f-95b8-4459-ae41-c594e77c5047", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7944dd59d4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8", Pod:"calico-kube-controllers-7944dd59d4-4mz58", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali115a5e89509", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.904 [INFO][5259] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.904 [INFO][5259] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" iface="eth0" netns="" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.904 [INFO][5259] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.904 [INFO][5259] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.924 [INFO][5269] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.924 [INFO][5269] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.924 [INFO][5269] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.930 [WARNING][5269] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.930 [INFO][5269] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.931 [INFO][5269] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.935060 env[1200]: 2025-05-17 00:34:23.933 [INFO][5259] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.935766 env[1200]: time="2025-05-17T00:34:23.935086348Z" level=info msg="TearDown network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\" successfully" May 17 00:34:23.935766 env[1200]: time="2025-05-17T00:34:23.935122416Z" level=info msg="StopPodSandbox for \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\" returns successfully" May 17 00:34:23.935766 env[1200]: time="2025-05-17T00:34:23.935654875Z" level=info msg="RemovePodSandbox for \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\"" May 17 00:34:23.935766 env[1200]: time="2025-05-17T00:34:23.935695782Z" level=info msg="Forcibly stopping sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\"" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.963 [WARNING][5287] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0", GenerateName:"calico-kube-controllers-7944dd59d4-", Namespace:"calico-system", SelfLink:"", UID:"8071938f-95b8-4459-ae41-c594e77c5047", ResourceVersion:"1105", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7944dd59d4", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b954b4e7693dfc73b99f0df0610f3e09ca7e32ac8edbf25b81151a86d21584f8", Pod:"calico-kube-controllers-7944dd59d4-4mz58", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali115a5e89509", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.964 [INFO][5287] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.964 [INFO][5287] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" iface="eth0" netns="" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.964 [INFO][5287] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.964 [INFO][5287] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.982 [INFO][5297] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.982 [INFO][5297] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.983 [INFO][5297] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.988 [WARNING][5297] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.989 [INFO][5297] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" HandleID="k8s-pod-network.6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" Workload="localhost-k8s-calico--kube--controllers--7944dd59d4--4mz58-eth0" May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.990 [INFO][5297] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:23.993639 env[1200]: 2025-05-17 00:34:23.991 [INFO][5287] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3" May 17 00:34:23.994361 env[1200]: time="2025-05-17T00:34:23.994288206Z" level=info msg="TearDown network for sandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\" successfully" May 17 00:34:23.998039 env[1200]: time="2025-05-17T00:34:23.997982101Z" level=info msg="RemovePodSandbox \"6cbf3950ecd5ba514b653764528889c4c2bb1837008590d2f719511dbe3413f3\" returns successfully" May 17 00:34:23.998569 env[1200]: time="2025-05-17T00:34:23.998542403Z" level=info msg="StopPodSandbox for \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\"" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.031 [WARNING][5315] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vkxng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b65ec255-9954-44f6-8517-cb2caadf1655", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e", Pod:"csi-node-driver-vkxng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali24b6ffb79f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.032 [INFO][5315] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.032 [INFO][5315] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" iface="eth0" netns="" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.032 [INFO][5315] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.032 [INFO][5315] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.051 [INFO][5323] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.051 [INFO][5323] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.051 [INFO][5323] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.056 [WARNING][5323] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.057 [INFO][5323] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.058 [INFO][5323] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:24.063395 env[1200]: 2025-05-17 00:34:24.060 [INFO][5315] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.063395 env[1200]: time="2025-05-17T00:34:24.062002732Z" level=info msg="TearDown network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\" successfully" May 17 00:34:24.063395 env[1200]: time="2025-05-17T00:34:24.062068365Z" level=info msg="StopPodSandbox for \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\" returns successfully" May 17 00:34:24.063395 env[1200]: time="2025-05-17T00:34:24.062880219Z" level=info msg="RemovePodSandbox for \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\"" May 17 00:34:24.063395 env[1200]: time="2025-05-17T00:34:24.062920385Z" level=info msg="Forcibly stopping sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\"" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.091 [WARNING][5339] cni-plugin/k8s.go 604: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--vkxng-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b65ec255-9954-44f6-8517-cb2caadf1655", ResourceVersion:"1198", Generation:0, CreationTimestamp:time.Date(2025, time.May, 17, 0, 33, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"68bf44dd5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6bfa8ddc99469aec5aa385f72a208b1d66beca21de9a5709b63e2aa1a8f4f79e", Pod:"csi-node-driver-vkxng", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali24b6ffb79f7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil), QoSControls:(*v3.QoSControls)(nil)}} May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.092 [INFO][5339] cni-plugin/k8s.go 640: Cleaning up netns ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.092 [INFO][5339] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" iface="eth0" netns="" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.092 [INFO][5339] cni-plugin/k8s.go 647: Releasing IP address(es) ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.092 [INFO][5339] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.106 [INFO][5348] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.106 [INFO][5348] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.106 [INFO][5348] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.112 [WARNING][5348] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.112 [INFO][5348] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" HandleID="k8s-pod-network.0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" Workload="localhost-k8s-csi--node--driver--vkxng-eth0" May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.113 [INFO][5348] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 17 00:34:24.116383 env[1200]: 2025-05-17 00:34:24.115 [INFO][5339] cni-plugin/k8s.go 653: Teardown processing complete. ContainerID="0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676" May 17 00:34:24.116861 env[1200]: time="2025-05-17T00:34:24.116419965Z" level=info msg="TearDown network for sandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\" successfully" May 17 00:34:24.119711 env[1200]: time="2025-05-17T00:34:24.119682229Z" level=info msg="RemovePodSandbox \"0bc2bd4364c8e9bfec1efcb2c6cc16e665629d06732eafe32473907632486676\" returns successfully" May 17 00:34:25.028036 systemd[1]: Started sshd@14-10.0.0.99:22-10.0.0.1:45242.service. May 17 00:34:25.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.99:22-10.0.0.1:45242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:25.029327 kernel: kauditd_printk_skb: 62 callbacks suppressed May 17 00:34:25.029401 kernel: audit: type=1130 audit(1747442065.027:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.99:22-10.0.0.1:45242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:25.071000 audit[5357]: USER_ACCT pid=5357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.072857 sshd[5357]: Accepted publickey for core from 10.0.0.1 port 45242 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:25.076581 sshd[5357]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:25.075000 audit[5357]: CRED_ACQ pid=5357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.080873 kernel: audit: type=1101 audit(1747442065.071:1483): pid=5357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.080923 kernel: audit: type=1103 audit(1747442065.075:1484): pid=5357 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.080949 kernel: audit: type=1006 audit(1747442065.075:1485): pid=5357 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 17 00:34:25.081576 systemd-logind[1188]: New session 15 of user core. May 17 00:34:25.082045 systemd[1]: Started session-15.scope. May 17 00:34:25.075000 audit[5357]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe685a06f0 a2=3 a3=0 items=0 ppid=1 pid=5357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:25.088170 kernel: audit: type=1300 audit(1747442065.075:1485): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe685a06f0 a2=3 a3=0 items=0 ppid=1 pid=5357 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:25.088214 kernel: audit: type=1327 audit(1747442065.075:1485): proctitle=737368643A20636F7265205B707269765D May 17 00:34:25.075000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:25.085000 audit[5357]: USER_START pid=5357 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.094554 kernel: audit: type=1105 audit(1747442065.085:1486): pid=5357 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.094596 kernel: audit: type=1103 audit(1747442065.086:1487): pid=5359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.086000 audit[5359]: CRED_ACQ pid=5359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.222242 sshd[5357]: pam_unix(sshd:session): session closed for user core May 17 00:34:25.222000 audit[5357]: USER_END pid=5357 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.224568 systemd[1]: sshd@14-10.0.0.99:22-10.0.0.1:45242.service: Deactivated successfully. May 17 00:34:25.225459 systemd[1]: session-15.scope: Deactivated successfully. May 17 00:34:25.226480 systemd-logind[1188]: Session 15 logged out. Waiting for processes to exit. May 17 00:34:25.227256 systemd-logind[1188]: Removed session 15. May 17 00:34:25.222000 audit[5357]: CRED_DISP pid=5357 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.232131 kernel: audit: type=1106 audit(1747442065.222:1488): pid=5357 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.232233 kernel: audit: type=1104 audit(1747442065.222:1489): pid=5357 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:25.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.99:22-10.0.0.1:45242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:27.759000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:27.759000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002b4c1c0 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:34:27.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:27.759000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:27.759000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:27.759000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002db22e0 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:34:27.759000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002cd6000 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:34:27.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:27.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:27.759000 audit[1776]: AVC avc: denied { watch } for pid=1776 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 17 00:34:27.759000 audit[1776]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002e34900 a2=fc6 a3=0 items=0 ppid=1643 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c691,c909 key=(null) May 17 00:34:27.759000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 17 00:34:28.896747 env[1200]: time="2025-05-17T00:34:28.896702223Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:34:29.149814 env[1200]: time="2025-05-17T00:34:29.149657008Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:29.150785 env[1200]: time="2025-05-17T00:34:29.150749614Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:29.151070 kubelet[1947]: E0517 00:34:29.151000 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:29.151395 kubelet[1947]: E0517 00:34:29.151085 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:29.151395 kubelet[1947]: E0517 00:34:29.151216 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-92dt5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-8c4cx_calico-system(01f33b6b-253c-4c1e-93af-24789a3c3b42): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:29.152413 kubelet[1947]: E0517 00:34:29.152375 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-8c4cx" podUID="01f33b6b-253c-4c1e-93af-24789a3c3b42" May 17 00:34:30.226232 systemd[1]: Started sshd@15-10.0.0.99:22-10.0.0.1:48052.service. May 17 00:34:30.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.99:22-10.0.0.1:48052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:30.227429 kernel: kauditd_printk_skb: 13 callbacks suppressed May 17 00:34:30.227469 kernel: audit: type=1130 audit(1747442070.225:1495): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.99:22-10.0.0.1:48052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:30.265000 audit[5381]: USER_ACCT pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.267057 sshd[5381]: Accepted publickey for core from 10.0.0.1 port 48052 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:30.268583 sshd[5381]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:30.267000 audit[5381]: CRED_ACQ pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.272574 systemd-logind[1188]: New session 16 of user core. May 17 00:34:30.273287 systemd[1]: Started session-16.scope. May 17 00:34:30.274919 kernel: audit: type=1101 audit(1747442070.265:1496): pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.274976 kernel: audit: type=1103 audit(1747442070.267:1497): pid=5381 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.274993 kernel: audit: type=1006 audit(1747442070.267:1498): pid=5381 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 17 00:34:30.267000 audit[5381]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd40509bb0 a2=3 a3=0 items=0 ppid=1 pid=5381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.281468 kernel: audit: type=1300 audit(1747442070.267:1498): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd40509bb0 a2=3 a3=0 items=0 ppid=1 pid=5381 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:30.281539 kernel: audit: type=1327 audit(1747442070.267:1498): proctitle=737368643A20636F7265205B707269765D May 17 00:34:30.267000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:30.282851 kernel: audit: type=1105 audit(1747442070.276:1499): pid=5381 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.276000 audit[5381]: USER_START pid=5381 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.278000 audit[5383]: CRED_ACQ pid=5383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.291294 kernel: audit: type=1103 audit(1747442070.278:1500): pid=5383 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.389942 sshd[5381]: pam_unix(sshd:session): session closed for user core May 17 00:34:30.389000 audit[5381]: USER_END pid=5381 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.392059 systemd[1]: sshd@15-10.0.0.99:22-10.0.0.1:48052.service: Deactivated successfully. May 17 00:34:30.392887 systemd[1]: session-16.scope: Deactivated successfully. May 17 00:34:30.393640 systemd-logind[1188]: Session 16 logged out. Waiting for processes to exit. May 17 00:34:30.394409 systemd-logind[1188]: Removed session 16. May 17 00:34:30.389000 audit[5381]: CRED_DISP pid=5381 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.400110 kernel: audit: type=1106 audit(1747442070.389:1501): pid=5381 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.400186 kernel: audit: type=1104 audit(1747442070.389:1502): pid=5381 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:30.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.99:22-10.0.0.1:48052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:31.897439 kubelet[1947]: E0517 00:34:31.897390 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\"\", failed to \"StartContainer\" for \"whisker-backend\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\"\"]" pod="calico-system/whisker-66fc645cdc-cm9xr" podUID="36c092a0-1ee9-4f64-9ad5-c04a441646ec" May 17 00:34:33.207336 kubelet[1947]: I0517 00:34:33.207289 1947 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 17 00:34:33.240000 audit[5395]: NETFILTER_CFG table=filter:129 family=2 entries=12 op=nft_register_rule pid=5395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:33.240000 audit[5395]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7fff0cb41d40 a2=0 a3=7fff0cb41d2c items=0 ppid=2053 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:33.240000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:33.245000 audit[5395]: NETFILTER_CFG table=nat:130 family=2 entries=34 op=nft_register_chain pid=5395 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:33.245000 audit[5395]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff0cb41d40 a2=0 a3=7fff0cb41d2c items=0 ppid=2053 pid=5395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:33.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:35.396210 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:34:35.396355 kernel: audit: type=1130 audit(1747442075.393:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.99:22-10.0.0.1:48064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:35.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.99:22-10.0.0.1:48064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:35.394610 systemd[1]: Started sshd@16-10.0.0.99:22-10.0.0.1:48064.service. May 17 00:34:35.439000 audit[5419]: USER_ACCT pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.440455 sshd[5419]: Accepted publickey for core from 10.0.0.1 port 48064 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:35.441960 sshd[5419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:35.440000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.445820 systemd-logind[1188]: New session 17 of user core. May 17 00:34:35.446849 systemd[1]: Started session-17.scope. May 17 00:34:35.450612 kernel: audit: type=1101 audit(1747442075.439:1507): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.450666 kernel: audit: type=1103 audit(1747442075.440:1508): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.453492 kernel: audit: type=1006 audit(1747442075.440:1509): pid=5419 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 17 00:34:35.440000 audit[5419]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1b71eb80 a2=3 a3=0 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:35.457874 kernel: audit: type=1300 audit(1747442075.440:1509): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1b71eb80 a2=3 a3=0 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:35.457922 kernel: audit: type=1327 audit(1747442075.440:1509): proctitle=737368643A20636F7265205B707269765D May 17 00:34:35.440000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:35.450000 audit[5419]: USER_START pid=5419 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.463508 kernel: audit: type=1105 audit(1747442075.450:1510): pid=5419 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.463554 kernel: audit: type=1103 audit(1747442075.451:1511): pid=5421 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.451000 audit[5421]: CRED_ACQ pid=5421 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.573925 sshd[5419]: pam_unix(sshd:session): session closed for user core May 17 00:34:35.573000 audit[5419]: USER_END pid=5419 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.578688 systemd[1]: sshd@16-10.0.0.99:22-10.0.0.1:48064.service: Deactivated successfully. May 17 00:34:35.579243 systemd[1]: session-17.scope: Deactivated successfully. May 17 00:34:35.583013 kernel: audit: type=1106 audit(1747442075.573:1512): pid=5419 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.583166 kernel: audit: type=1104 audit(1747442075.574:1513): pid=5419 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.574000 audit[5419]: CRED_DISP pid=5419 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.583144 systemd-logind[1188]: Session 17 logged out. Waiting for processes to exit. May 17 00:34:35.583367 systemd[1]: Started sshd@17-10.0.0.99:22-10.0.0.1:48080.service. May 17 00:34:35.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.99:22-10.0.0.1:48064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:35.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.99:22-10.0.0.1:48080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:35.584542 systemd-logind[1188]: Removed session 17. May 17 00:34:35.621000 audit[5432]: USER_ACCT pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.622984 sshd[5432]: Accepted publickey for core from 10.0.0.1 port 48080 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:35.623000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.623000 audit[5432]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8f1d8dc0 a2=3 a3=0 items=0 ppid=1 pid=5432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:35.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:35.624503 sshd[5432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:35.628059 systemd-logind[1188]: New session 18 of user core. May 17 00:34:35.629014 systemd[1]: Started session-18.scope. May 17 00:34:35.632000 audit[5432]: USER_START pid=5432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:35.633000 audit[5434]: CRED_ACQ pid=5434 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:36.158936 sshd[5432]: pam_unix(sshd:session): session closed for user core May 17 00:34:36.158000 audit[5432]: USER_END pid=5432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:36.158000 audit[5432]: CRED_DISP pid=5432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:36.161825 systemd[1]: sshd@17-10.0.0.99:22-10.0.0.1:48080.service: Deactivated successfully. May 17 00:34:36.162503 systemd[1]: session-18.scope: Deactivated successfully. May 17 00:34:36.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.99:22-10.0.0.1:48080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:36.163151 systemd-logind[1188]: Session 18 logged out. Waiting for processes to exit. May 17 00:34:36.164234 systemd[1]: Started sshd@18-10.0.0.99:22-10.0.0.1:48086.service. May 17 00:34:36.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.99:22-10.0.0.1:48086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:36.165352 systemd-logind[1188]: Removed session 18. May 17 00:34:36.203000 audit[5443]: USER_ACCT pid=5443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:36.204825 sshd[5443]: Accepted publickey for core from 10.0.0.1 port 48086 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:36.204000 audit[5443]: CRED_ACQ pid=5443 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:36.204000 audit[5443]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe448f7140 a2=3 a3=0 items=0 ppid=1 pid=5443 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:36.204000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:36.205623 sshd[5443]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:36.208464 systemd-logind[1188]: New session 19 of user core. May 17 00:34:36.209190 systemd[1]: Started session-19.scope. May 17 00:34:36.212000 audit[5443]: USER_START pid=5443 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:36.213000 audit[5445]: CRED_ACQ pid=5445 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:36.325935 systemd[1]: run-containerd-runc-k8s.io-0c539edb76188690c1a9149789afadf1097c222228b22f3b86bb203636d4c355-runc.z2ajiT.mount: Deactivated successfully. May 17 00:34:38.196000 audit[5478]: NETFILTER_CFG table=filter:131 family=2 entries=24 op=nft_register_rule pid=5478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:38.196000 audit[5478]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fffda6df080 a2=0 a3=7fffda6df06c items=0 ppid=2053 pid=5478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:38.202000 audit[5478]: NETFILTER_CFG table=nat:132 family=2 entries=22 op=nft_register_rule pid=5478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:38.202000 audit[5478]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffda6df080 a2=0 a3=0 items=0 ppid=2053 pid=5478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:38.223000 audit[5480]: NETFILTER_CFG table=filter:133 family=2 entries=36 op=nft_register_rule pid=5480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:38.223000 audit[5480]: SYSCALL arch=c000003e syscall=46 success=yes exit=13432 a0=3 a1=7fffed54dd10 a2=0 a3=7fffed54dcfc items=0 ppid=2053 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:38.229000 audit[5480]: NETFILTER_CFG table=nat:134 family=2 entries=22 op=nft_register_rule pid=5480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:38.229000 audit[5480]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffed54dd10 a2=0 a3=0 items=0 ppid=2053 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.229000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:38.237359 sshd[5443]: pam_unix(sshd:session): session closed for user core May 17 00:34:38.237000 audit[5443]: USER_END pid=5443 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.237000 audit[5443]: CRED_DISP pid=5443 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.99:22-10.0.0.1:36456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.240919 systemd[1]: Started sshd@19-10.0.0.99:22-10.0.0.1:36456.service. May 17 00:34:38.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.99:22-10.0.0.1:48086 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.241351 systemd[1]: sshd@18-10.0.0.99:22-10.0.0.1:48086.service: Deactivated successfully. May 17 00:34:38.241958 systemd[1]: session-19.scope: Deactivated successfully. May 17 00:34:38.242508 systemd-logind[1188]: Session 19 logged out. Waiting for processes to exit. May 17 00:34:38.243347 systemd-logind[1188]: Removed session 19. May 17 00:34:38.283000 audit[5482]: USER_ACCT pid=5482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.285843 sshd[5482]: Accepted publickey for core from 10.0.0.1 port 36456 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:38.285000 audit[5482]: CRED_ACQ pid=5482 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.285000 audit[5482]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1acc22c0 a2=3 a3=0 items=0 ppid=1 pid=5482 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.285000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:38.286571 sshd[5482]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:38.292669 systemd[1]: Started session-20.scope. May 17 00:34:38.293194 systemd-logind[1188]: New session 20 of user core. May 17 00:34:38.298000 audit[5482]: USER_START pid=5482 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.299000 audit[5485]: CRED_ACQ pid=5485 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.700172 sshd[5482]: pam_unix(sshd:session): session closed for user core May 17 00:34:38.701000 audit[5482]: USER_END pid=5482 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.701000 audit[5482]: CRED_DISP pid=5482 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.704211 systemd[1]: Started sshd@20-10.0.0.99:22-10.0.0.1:36466.service. May 17 00:34:38.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.99:22-10.0.0.1:36466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.704638 systemd[1]: sshd@19-10.0.0.99:22-10.0.0.1:36456.service: Deactivated successfully. May 17 00:34:38.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.99:22-10.0.0.1:36456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.705645 systemd[1]: session-20.scope: Deactivated successfully. May 17 00:34:38.706416 systemd-logind[1188]: Session 20 logged out. Waiting for processes to exit. May 17 00:34:38.707610 systemd-logind[1188]: Removed session 20. May 17 00:34:38.748000 audit[5493]: USER_ACCT pid=5493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.749394 sshd[5493]: Accepted publickey for core from 10.0.0.1 port 36466 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:38.749000 audit[5493]: CRED_ACQ pid=5493 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.749000 audit[5493]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeceb72a00 a2=3 a3=0 items=0 ppid=1 pid=5493 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:38.749000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:38.750572 sshd[5493]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:38.754789 systemd-logind[1188]: New session 21 of user core. May 17 00:34:38.755867 systemd[1]: Started session-21.scope. May 17 00:34:38.759000 audit[5493]: USER_START pid=5493 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.760000 audit[5496]: CRED_ACQ pid=5496 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.860918 sshd[5493]: pam_unix(sshd:session): session closed for user core May 17 00:34:38.861000 audit[5493]: USER_END pid=5493 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.861000 audit[5493]: CRED_DISP pid=5493 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:38.863532 systemd[1]: sshd@20-10.0.0.99:22-10.0.0.1:36466.service: Deactivated successfully. May 17 00:34:38.864241 systemd[1]: session-21.scope: Deactivated successfully. May 17 00:34:38.862000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.99:22-10.0.0.1:36466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:38.864917 systemd-logind[1188]: Session 21 logged out. Waiting for processes to exit. May 17 00:34:38.865844 systemd-logind[1188]: Removed session 21. May 17 00:34:41.899268 kubelet[1947]: E0517 00:34:41.899204 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:42.896747 kubelet[1947]: E0517 00:34:42.896693 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ImagePullBackOff: \"Back-off pulling image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\"\"" pod="calico-system/goldmane-8f77d7b6c-8c4cx" podUID="01f33b6b-253c-4c1e-93af-24789a3c3b42" May 17 00:34:43.865407 systemd[1]: Started sshd@21-10.0.0.99:22-10.0.0.1:36474.service. May 17 00:34:43.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.99:22-10.0.0.1:36474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:43.866933 kernel: kauditd_printk_skb: 57 callbacks suppressed May 17 00:34:43.866982 kernel: audit: type=1130 audit(1747442083.864:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.99:22-10.0.0.1:36474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:43.912709 sshd[5507]: Accepted publickey for core from 10.0.0.1 port 36474 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:43.911000 audit[5507]: USER_ACCT pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.914198 sshd[5507]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:43.912000 audit[5507]: CRED_ACQ pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.917976 systemd-logind[1188]: New session 22 of user core. May 17 00:34:43.918307 systemd[1]: Started session-22.scope. May 17 00:34:43.922062 kernel: audit: type=1101 audit(1747442083.911:1556): pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.922168 kernel: audit: type=1103 audit(1747442083.912:1557): pid=5507 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.922188 kernel: audit: type=1006 audit(1747442083.912:1558): pid=5507 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 17 00:34:43.924640 kernel: audit: type=1300 audit(1747442083.912:1558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe281be700 a2=3 a3=0 items=0 ppid=1 pid=5507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:43.912000 audit[5507]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe281be700 a2=3 a3=0 items=0 ppid=1 pid=5507 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:43.934260 kernel: audit: type=1327 audit(1747442083.912:1558): proctitle=737368643A20636F7265205B707269765D May 17 00:34:43.912000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:43.935734 kernel: audit: type=1105 audit(1747442083.921:1559): pid=5507 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.921000 audit[5507]: USER_START pid=5507 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.940375 kernel: audit: type=1103 audit(1747442083.922:1560): pid=5509 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:43.922000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:44.038464 sshd[5507]: pam_unix(sshd:session): session closed for user core May 17 00:34:44.038000 audit[5507]: USER_END pid=5507 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:44.040805 systemd[1]: sshd@21-10.0.0.99:22-10.0.0.1:36474.service: Deactivated successfully. May 17 00:34:44.041550 systemd[1]: session-22.scope: Deactivated successfully. May 17 00:34:44.042119 systemd-logind[1188]: Session 22 logged out. Waiting for processes to exit. May 17 00:34:44.042792 systemd-logind[1188]: Removed session 22. May 17 00:34:44.038000 audit[5507]: CRED_DISP pid=5507 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:44.074117 kernel: audit: type=1106 audit(1747442084.038:1561): pid=5507 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:44.074223 kernel: audit: type=1104 audit(1747442084.038:1562): pid=5507 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:44.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.99:22-10.0.0.1:36474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:45.287000 audit[5520]: NETFILTER_CFG table=filter:135 family=2 entries=24 op=nft_register_rule pid=5520 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:45.287000 audit[5520]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffcbbddb0d0 a2=0 a3=7ffcbbddb0bc items=0 ppid=2053 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.287000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:45.294000 audit[5520]: NETFILTER_CFG table=nat:136 family=2 entries=106 op=nft_register_chain pid=5520 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 17 00:34:45.294000 audit[5520]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffcbbddb0d0 a2=0 a3=7ffcbbddb0bc items=0 ppid=2053 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:45.294000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 17 00:34:46.897524 env[1200]: time="2025-05-17T00:34:46.897477130Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\"" May 17 00:34:47.118676 env[1200]: time="2025-05-17T00:34:47.118601383Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:47.119837 env[1200]: time="2025-05-17T00:34:47.119788017Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:47.120128 kubelet[1947]: E0517 00:34:47.120074 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:47.120419 kubelet[1947]: E0517 00:34:47.120150 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker:v3.30.0" May 17 00:34:47.120419 kubelet[1947]: E0517 00:34:47.120311 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker,Image:ghcr.io/flatcar/calico/whisker:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:CALICO_VERSION,Value:v3.30.0,ValueFrom:nil,},EnvVar{Name:CLUSTER_ID,Value:3587bf1e80664abdaf5d78c57ed793ea,ValueFrom:nil,},EnvVar{Name:CLUSTER_TYPE,Value:typha,kdd,k8s,operator,bgp,kubeadm,ValueFrom:nil,},EnvVar{Name:NOTIFICATIONS,Value:Enabled,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:kube-api-access-qq764,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-66fc645cdc-cm9xr_calico-system(36c092a0-1ee9-4f64-9ad5-c04a441646ec): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:47.122164 env[1200]: time="2025-05-17T00:34:47.122118434Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\"" May 17 00:34:47.340558 env[1200]: time="2025-05-17T00:34:47.340400648Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:47.341885 env[1200]: time="2025-05-17T00:34:47.341839764Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:47.342118 kubelet[1947]: E0517 00:34:47.342079 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:47.342214 kubelet[1947]: E0517 00:34:47.342131 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/whisker-backend:v3.30.0" May 17 00:34:47.342273 kubelet[1947]: E0517 00:34:47.342234 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:whisker-backend,Image:ghcr.io/flatcar/calico/whisker-backend:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:3002,ValueFrom:nil,},EnvVar{Name:GOLDMANE_HOST,Value:goldmane.calico-system.svc.cluster.local:7443,ValueFrom:nil,},EnvVar{Name:TLS_CERT_PATH,Value:/whisker-backend-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:TLS_KEY_PATH,Value:/whisker-backend-key-pair/tls.key,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:whisker-backend-key-pair,ReadOnly:true,MountPath:/whisker-backend-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:whisker-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-qq764,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod whisker-66fc645cdc-cm9xr_calico-system(36c092a0-1ee9-4f64-9ad5-c04a441646ec): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:47.343639 kubelet[1947]: E0517 00:34:47.343600 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="[failed to \"StartContainer\" for \"whisker\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\", failed to \"StartContainer\" for \"whisker-backend\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/whisker-backend:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"]" pod="calico-system/whisker-66fc645cdc-cm9xr" podUID="36c092a0-1ee9-4f64-9ad5-c04a441646ec" May 17 00:34:48.896160 kubelet[1947]: E0517 00:34:48.896115 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:49.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.99:22-10.0.0.1:47220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:49.044689 systemd[1]: Started sshd@22-10.0.0.99:22-10.0.0.1:47220.service. May 17 00:34:49.045807 kernel: kauditd_printk_skb: 7 callbacks suppressed May 17 00:34:49.045883 kernel: audit: type=1130 audit(1747442089.043:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.99:22-10.0.0.1:47220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:49.088000 audit[5531]: USER_ACCT pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.089760 sshd[5531]: Accepted publickey for core from 10.0.0.1 port 47220 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:49.091615 sshd[5531]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:49.090000 audit[5531]: CRED_ACQ pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.094955 systemd-logind[1188]: New session 23 of user core. May 17 00:34:49.095721 systemd[1]: Started session-23.scope. May 17 00:34:49.097441 kernel: audit: type=1101 audit(1747442089.088:1567): pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.097775 kernel: audit: type=1103 audit(1747442089.090:1568): pid=5531 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.097821 kernel: audit: type=1006 audit(1747442089.090:1569): pid=5531 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 17 00:34:49.090000 audit[5531]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadc048a0 a2=3 a3=0 items=0 ppid=1 pid=5531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:49.103985 kernel: audit: type=1300 audit(1747442089.090:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadc048a0 a2=3 a3=0 items=0 ppid=1 pid=5531 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:49.104051 kernel: audit: type=1327 audit(1747442089.090:1569): proctitle=737368643A20636F7265205B707269765D May 17 00:34:49.090000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:49.099000 audit[5531]: USER_START pid=5531 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.109985 kernel: audit: type=1105 audit(1747442089.099:1570): pid=5531 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.110184 kernel: audit: type=1103 audit(1747442089.100:1571): pid=5533 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.100000 audit[5533]: CRED_ACQ pid=5533 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.209939 sshd[5531]: pam_unix(sshd:session): session closed for user core May 17 00:34:49.209000 audit[5531]: USER_END pid=5531 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.212000 audit[5531]: CRED_DISP pid=5531 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.215966 systemd[1]: sshd@22-10.0.0.99:22-10.0.0.1:47220.service: Deactivated successfully. May 17 00:34:49.216840 systemd[1]: session-23.scope: Deactivated successfully. May 17 00:34:49.218159 systemd-logind[1188]: Session 23 logged out. Waiting for processes to exit. May 17 00:34:49.219148 kernel: audit: type=1106 audit(1747442089.209:1572): pid=5531 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.219241 kernel: audit: type=1104 audit(1747442089.212:1573): pid=5531 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:49.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.99:22-10.0.0.1:47220 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:49.219163 systemd-logind[1188]: Removed session 23. May 17 00:34:49.897621 kubelet[1947]: E0517 00:34:49.897566 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:51.895804 kubelet[1947]: E0517 00:34:51.895767 1947 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 17 00:34:54.213902 systemd[1]: Started sshd@23-10.0.0.99:22-10.0.0.1:47236.service. May 17 00:34:54.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.99:22-10.0.0.1:47236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:54.219072 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:34:54.219151 kernel: audit: type=1130 audit(1747442094.212:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.99:22-10.0.0.1:47236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:54.257000 audit[5544]: USER_ACCT pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.261990 sshd[5544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:54.262541 sshd[5544]: Accepted publickey for core from 10.0.0.1 port 47236 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:54.260000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.266357 kernel: audit: type=1101 audit(1747442094.257:1576): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.266426 kernel: audit: type=1103 audit(1747442094.260:1577): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.266458 kernel: audit: type=1006 audit(1747442094.260:1578): pid=5544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 17 00:34:54.267414 systemd[1]: Started session-24.scope. May 17 00:34:54.267953 systemd-logind[1188]: New session 24 of user core. May 17 00:34:54.268751 kernel: audit: type=1300 audit(1747442094.260:1578): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc13d75470 a2=3 a3=0 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.260000 audit[5544]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc13d75470 a2=3 a3=0 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:54.276048 kernel: audit: type=1327 audit(1747442094.260:1578): proctitle=737368643A20636F7265205B707269765D May 17 00:34:54.276140 kernel: audit: type=1105 audit(1747442094.272:1579): pid=5544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.260000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:54.272000 audit[5544]: USER_START pid=5544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.273000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.282286 kernel: audit: type=1103 audit(1747442094.273:1580): pid=5546 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.384261 sshd[5544]: pam_unix(sshd:session): session closed for user core May 17 00:34:54.384000 audit[5544]: USER_END pid=5544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.386357 systemd[1]: sshd@23-10.0.0.99:22-10.0.0.1:47236.service: Deactivated successfully. May 17 00:34:54.387194 systemd[1]: session-24.scope: Deactivated successfully. May 17 00:34:54.387721 systemd-logind[1188]: Session 24 logged out. Waiting for processes to exit. May 17 00:34:54.388462 systemd-logind[1188]: Removed session 24. May 17 00:34:54.384000 audit[5544]: CRED_DISP pid=5544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.392916 kernel: audit: type=1106 audit(1747442094.384:1581): pid=5544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.392957 kernel: audit: type=1104 audit(1747442094.384:1582): pid=5544 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:54.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.99:22-10.0.0.1:47236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:55.896542 env[1200]: time="2025-05-17T00:34:55.896492305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\"" May 17 00:34:56.152388 env[1200]: time="2025-05-17T00:34:56.152239002Z" level=info msg="trying next host" error="failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" host=ghcr.io May 17 00:34:56.154380 env[1200]: time="2025-05-17T00:34:56.154344345Z" level=error msg="PullImage \"ghcr.io/flatcar/calico/goldmane:v3.30.0\" failed" error="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" May 17 00:34:56.154602 kubelet[1947]: E0517 00:34:56.154557 1947 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:56.154950 kubelet[1947]: E0517 00:34:56.154617 1947 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" image="ghcr.io/flatcar/calico/goldmane:v3.30.0" May 17 00:34:56.154950 kubelet[1947]: E0517 00:34:56.154748 1947 kuberuntime_manager.go:1274] "Unhandled Error" err="container &Container{Name:goldmane,Image:ghcr.io/flatcar/calico/goldmane:v3.30.0,Command:[],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:LOG_LEVEL,Value:INFO,ValueFrom:nil,},EnvVar{Name:PORT,Value:7443,ValueFrom:nil,},EnvVar{Name:SERVER_CERT_PATH,Value:/goldmane-key-pair/tls.crt,ValueFrom:nil,},EnvVar{Name:SERVER_KEY_PATH,Value:/goldmane-key-pair/tls.key,ValueFrom:nil,},EnvVar{Name:CA_CERT_PATH,Value:/etc/pki/tls/certs/tigera-ca-bundle.crt,ValueFrom:nil,},EnvVar{Name:PUSH_URL,Value:https://guardian.calico-system.svc.cluster.local:443/api/v1/flows/bulk,ValueFrom:nil,},EnvVar{Name:FILE_CONFIG_PATH,Value:/config/config.json,ValueFrom:nil,},EnvVar{Name:HEALTH_ENABLED,Value:true,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:config,ReadOnly:true,MountPath:/config,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-ca-bundle,ReadOnly:true,MountPath:/etc/pki/tls/certs,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:goldmane-key-pair,ReadOnly:true,MountPath:/goldmane-key-pair,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-92dt5,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -live],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:60,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},ReadinessProbe:&Probe{ProbeHandler:ProbeHandler{Exec:&ExecAction{Command:[/health -ready],},HTTPGet:nil,TCPSocket:nil,GRPC:nil,},InitialDelaySeconds:0,TimeoutSeconds:5,PeriodSeconds:30,SuccessThreshold:1,FailureThreshold:3,TerminationGracePeriodSeconds:nil,},Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:&SecurityContext{Capabilities:&Capabilities{Add:[],Drop:[ALL],},Privileged:*false,SELinuxOptions:nil,RunAsUser:*10001,RunAsNonRoot:*true,ReadOnlyRootFilesystem:nil,AllowPrivilegeEscalation:*false,RunAsGroup:*10001,ProcMount:nil,WindowsOptions:nil,SeccompProfile:&SeccompProfile{Type:RuntimeDefault,LocalhostProfile:nil,},AppArmorProfile:nil,},Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod goldmane-8f77d7b6c-8c4cx_calico-system(01f33b6b-253c-4c1e-93af-24789a3c3b42): ErrImagePull: failed to pull and unpack image \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to resolve reference \"ghcr.io/flatcar/calico/goldmane:v3.30.0\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden" logger="UnhandledError" May 17 00:34:56.156234 kubelet[1947]: E0517 00:34:56.156194 1947 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"goldmane\" with ErrImagePull: \"failed to pull and unpack image \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to resolve reference \\\"ghcr.io/flatcar/calico/goldmane:v3.30.0\\\": failed to authorize: failed to fetch anonymous token: unexpected status: 403 Forbidden\"" pod="calico-system/goldmane-8f77d7b6c-8c4cx" podUID="01f33b6b-253c-4c1e-93af-24789a3c3b42" May 17 00:34:59.389145 systemd[1]: Started sshd@24-10.0.0.99:22-10.0.0.1:43236.service. May 17 00:34:59.393109 kernel: kauditd_printk_skb: 1 callbacks suppressed May 17 00:34:59.393184 kernel: audit: type=1130 audit(1747442099.388:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.99:22-10.0.0.1:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:59.388000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.99:22-10.0.0.1:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:59.429000 audit[5558]: USER_ACCT pid=5558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.440834 kernel: audit: type=1101 audit(1747442099.429:1585): pid=5558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.440896 kernel: audit: type=1103 audit(1747442099.434:1586): pid=5558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.434000 audit[5558]: CRED_ACQ pid=5558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.440979 sshd[5558]: Accepted publickey for core from 10.0.0.1 port 43236 ssh2: RSA SHA256:qUHWRKrHUGpvGAKaXIx4BM5iuCZcAPI02a20wC9hycU May 17 00:34:59.436006 sshd[5558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 17 00:34:59.439843 systemd[1]: Started session-25.scope. May 17 00:34:59.440771 systemd-logind[1188]: New session 25 of user core. May 17 00:34:59.450169 kernel: audit: type=1006 audit(1747442099.434:1587): pid=5558 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 17 00:34:59.450250 kernel: audit: type=1300 audit(1747442099.434:1587): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff996adbc0 a2=3 a3=0 items=0 ppid=1 pid=5558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.434000 audit[5558]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff996adbc0 a2=3 a3=0 items=0 ppid=1 pid=5558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 17 00:34:59.452198 kernel: audit: type=1327 audit(1747442099.434:1587): proctitle=737368643A20636F7265205B707269765D May 17 00:34:59.434000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 17 00:34:59.458056 kernel: audit: type=1105 audit(1747442099.443:1588): pid=5558 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.443000 audit[5558]: USER_START pid=5558 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.444000 audit[5560]: CRED_ACQ pid=5560 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.463510 kernel: audit: type=1103 audit(1747442099.444:1589): pid=5560 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.577829 sshd[5558]: pam_unix(sshd:session): session closed for user core May 17 00:34:59.578000 audit[5558]: USER_END pid=5558 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.583391 systemd[1]: sshd@24-10.0.0.99:22-10.0.0.1:43236.service: Deactivated successfully. May 17 00:34:59.578000 audit[5558]: CRED_DISP pid=5558 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.584226 systemd[1]: session-25.scope: Deactivated successfully. May 17 00:34:59.587339 systemd-logind[1188]: Session 25 logged out. Waiting for processes to exit. May 17 00:34:59.587416 kernel: audit: type=1106 audit(1747442099.578:1590): pid=5558 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.587449 kernel: audit: type=1104 audit(1747442099.578:1591): pid=5558 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 17 00:34:59.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.99:22-10.0.0.1:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 17 00:34:59.588036 systemd-logind[1188]: Removed session 25.